Infosecurity Opinions
Can Organizations Ever Reach a State of Zero Trust?
Zero trust is not a security solution - it's a state of mind
#HowTo: Identify and Appoint the Right Security Partner for Your Organization
What considerations should orgs make when deciding whether to work with a security partner?
US Supreme Court Rules on Key Software Development Practice
What are the ramifications of the recent supreme court ruling in the Google v Oracle case?
#WorldPasswordDay 2021: Why Waving Goodbye to Passwords is Still the Best Password We Can Use This Year
Has the time come to say goodbye to passwords?
The 2021 Cloud Native Landscape
Security pros must remain aware of new trends in the cloud native environment
Testing Cyber-defenses: Does the ‘New Normal’ Mean We Need to Up the Stakes?
Do orgs need to ramp up cybersecurity testing practices in the post-COVID world?
Businesses Must Secure Their Devices Now to Safely Embrace Arrival of Hybrid Working
Businesses must adapt their security structure to enable a hybrid model of work
#HowTo: Leverage Existing ICS Security Investments to Effectively Reduce Cyber Risk
When your cybersecurity budget is slim and your team petite, how can you implement the required level of cybersecurity?
Three Questions to Consider to Help Mitigate Against Supply Chain Attacks
How should orgs assess current approaches to mitigate against supply chain attacks?
Taxed and Hacked: How Your Company Could Be at Risk This Tax Season
What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?
Outlier Detection Techniques for Fraud
Data science techniques can help detect credit card fraud
What if we Gave Users Control of Their Own Digital Identity?
How can users be put back in control of their digital identities?
Personal Security IS Enterprise Security
Helping employees stay safe in their personal lives will translate into work
#HowTo: Protect Your Employees from Data Loss
How should orgs tackle insider risk amid the shift to remote working?
How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This
SMEs need to take a new approach to protecting themselves from cyber-attacks
CSP & Magecart Web Skimmers: Facts and Fiction
It is important for e-commerce providers to fully understand the evolution of Magecart attacks
How Secure Are Healthcare IT Systems? New Research Provides a Glimpse
How can healthcare orgs make themselves more secure amid rising attacks?
The Case For and Against Criminalizing Ransomware
What are the main issues surrounding ransomware payments?
Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots
Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process
HowTo: Improve Your Security Team’s Remediation Efficiency
What are the key steps to developing a risk-based vulnerability management strategy?