Infosecurity Opinions
#HowTo: Protect Medical Institutions from Cyber-Attacks
Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems
How Ransomware is Teaming Up with DDoS
Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect
Data Sovereignty and Privacy Compliance Post Schrems II
How can organizations remain compliant following the Schrems II decision last year?
Why Enterprise Users Can't Wait for Patch Updates
Are software patches often little more than a glorified form of Whack-A-Mole?
How Has the Education Sector Adapted to Life in the Cloud?
Education institutions have faced particular challenges with cloud adoption during COVID-19
Signs, Causes and Solutions for Network Data Breaches
What are the common signs and solutions for dealing with network breaches?
#HowTo: Ensure Third Parties Don't Compromise Your Supply Chain
More disciplined attention is required to make sure third party vendors don't compromise your supply chain
Protecting CNI: It’s About the Collective
Nominet argues that protecting CNI requires a collaborative approach
Disengaged Employees Could Become Your Organization's Greatest Security Threat
Organizations must establish accountability for security to avoid the danger posed by disengaged employees
What Are GDPR's Hidden Benefits Three Years On?
What should organizations do to ensure they meet GDPR standards on data security and privacy?
What's New in the EU's Updated Standard Contractual Clauses?
Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses
Is the "Cyber Skills Shortage" a Misnomer?
If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage
#HowTo: Approach Identity Management
To support identity effectively, we have to implement processes that use standards and embrace technologies
Fileless Attacks: Addressing Evolving Malware Threats
Organizations must consider fileless malware threats as well as traditional approaches
What We Can Learn from Recent High Profile Cyber Attacks?
What actions should organisations take to improve their security amid rising and more sophisticated threats?
Proactive Security Key to Combatting Supply Chain Attacks
What lessons can be learned from the recent Air India data breach?
How Innovation Powered by Privacy Can Eliminate Data Waste
Organizations need to embrace a privacy mindset to use data successfully
What Will Enterprise Security Look Like After COVID-19?
Orgs need to focus on securing the digital shift during COVID-19
#HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment
How can orgs get the most from cloud-native environments and agile delivery?
Biden’s Executive Order: The Inclusivity Imperative
The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order