Infosecurity Opinions
Encrypted Data in the Cloud
Encryption will be vital in preventing data breaches in the cloud
Understanding Education and Certifications to Help Find Your Path in Cybersecurity
There's a need for clarity on options for career pathways for those wanting to enter the cybersecurity industry
Tax Season is in Full Swing and so is Unemployment Fraud
With the tax season in full swing, protecting against financial fraud is vital
Vital Signs: Why Service Monitoring is a Key Step in Effective IoT Cybersecurity
Should we consider service monitoring as the foundation to IoT security?
Promoting a Cultural Shift for Cybersecurity
Developing a good security culture will reduce the risk of scams
#HowTo: Stop Hackers Targeting Your Home
How can organizations defend their remote workforce from hackers?
It’s Time to Captivate the Next Generation of Cybersecurity Professionals
With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses
Firewall and Malware Challenges for Virtualized Telecom Networks
How can service providers defend against attacks targeting virtualized telecom networks
Remote Working: The New Security Perimeter
Do orgs need to rethink their security frameworks to adapt to a remote model?
Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder
How have ransomware attacks evolved over the past year?
#HowTo: Implement Zero-Trust into IoT Security
How can orgs ensure the surge in IoT devices used by employees is secure?
Cybersecurity State Power Struggles
Security focus must shift from stopping malicious access to protecting data itself
Transforming Security Strategies in Times of Uncertainty
The pandemic will not be the last disruption to security planning
Communication is Crucial in the Fight Against Phishing Scams
What communication strategies should orgs employ to mitigate against the risk of phishing scams?
Securing Critical National Infrastructure: The Top Four Obstacles to Overcome
Why is securing CNI such a challenge and how you can build your strategy for this effort?
The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay
What are the main tricks being pulled by cyber-criminals to lure victims?
#WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies
Orgs must develop proper backup and recovery strategies now
#WorldBackupDay: How to Protect the Last Line of Defense
How can orgs ensure their backups are safe?
Software-Defined Telecommunications and the Risk of DDoS
What will be the security risks associated with 5G telecoms and its associated architecture?
#HowTo: Use Marketing Principles to Gain Employee Buy-In and Results
Can marketing principles enhance security awareness training?