Infosecurity Opinions
The 2021 Cloud Native Landscape
Security pros must remain aware of new trends in the cloud native environment
Testing Cyber-defenses: Does the ‘New Normal’ Mean We Need to Up the Stakes?
Do orgs need to ramp up cybersecurity testing practices in the post-COVID world?
Businesses Must Secure Their Devices Now to Safely Embrace Arrival of Hybrid Working
Businesses must adapt their security structure to enable a hybrid model of work
#HowTo: Leverage Existing ICS Security Investments to Effectively Reduce Cyber Risk
When your cybersecurity budget is slim and your team petite, how can you implement the required level of cybersecurity?
Three Questions to Consider to Help Mitigate Against Supply Chain Attacks
How should orgs assess current approaches to mitigate against supply chain attacks?
Taxed and Hacked: How Your Company Could Be at Risk This Tax Season
What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?
Outlier Detection Techniques for Fraud
Data science techniques can help detect credit card fraud
What if we Gave Users Control of Their Own Digital Identity?
How can users be put back in control of their digital identities?
Personal Security IS Enterprise Security
Helping employees stay safe in their personal lives will translate into work
#HowTo: Protect Your Employees from Data Loss
How should orgs tackle insider risk amid the shift to remote working?
How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This
SMEs need to take a new approach to protecting themselves from cyber-attacks
CSP & Magecart Web Skimmers: Facts and Fiction
It is important for e-commerce providers to fully understand the evolution of Magecart attacks
How Secure Are Healthcare IT Systems? New Research Provides a Glimpse
How can healthcare orgs make themselves more secure amid rising attacks?
The Case For and Against Criminalizing Ransomware
What are the main issues surrounding ransomware payments?
Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots
Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process
HowTo: Improve Your Security Team’s Remediation Efficiency
What are the key steps to developing a risk-based vulnerability management strategy?
Encrypted Data in the Cloud
Encryption will be vital in preventing data breaches in the cloud
Understanding Education and Certifications to Help Find Your Path in Cybersecurity
There's a need for clarity on options for career pathways for those wanting to enter the cybersecurity industry
Tax Season is in Full Swing and so is Unemployment Fraud
With the tax season in full swing, protecting against financial fraud is vital
Vital Signs: Why Service Monitoring is a Key Step in Effective IoT Cybersecurity
Should we consider service monitoring as the foundation to IoT security?