Infosecurity Opinions
Promoting a Cultural Shift for Cybersecurity
Developing a good security culture will reduce the risk of scams
#HowTo: Stop Hackers Targeting Your Home
How can organizations defend their remote workforce from hackers?
It’s Time to Captivate the Next Generation of Cybersecurity Professionals
With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses
Firewall and Malware Challenges for Virtualized Telecom Networks
How can service providers defend against attacks targeting virtualized telecom networks
Remote Working: The New Security Perimeter
Do orgs need to rethink their security frameworks to adapt to a remote model?
Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder
How have ransomware attacks evolved over the past year?
#HowTo: Implement Zero-Trust into IoT Security
How can orgs ensure the surge in IoT devices used by employees is secure?
Cybersecurity State Power Struggles
Security focus must shift from stopping malicious access to protecting data itself
Transforming Security Strategies in Times of Uncertainty
The pandemic will not be the last disruption to security planning
Communication is Crucial in the Fight Against Phishing Scams
What communication strategies should orgs employ to mitigate against the risk of phishing scams?
Securing Critical National Infrastructure: The Top Four Obstacles to Overcome
Why is securing CNI such a challenge and how you can build your strategy for this effort?
The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay
What are the main tricks being pulled by cyber-criminals to lure victims?
#WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies
Orgs must develop proper backup and recovery strategies now
#WorldBackupDay: How to Protect the Last Line of Defense
How can orgs ensure their backups are safe?
Software-Defined Telecommunications and the Risk of DDoS
What will be the security risks associated with 5G telecoms and its associated architecture?
#HowTo: Use Marketing Principles to Gain Employee Buy-In and Results
Can marketing principles enhance security awareness training?
How Behavioral Biometrics is Combating Credential Stuffing Attacks
Can biometrics mitigate bad cybersecurity behaviors?
Was it a Breach or Credential Stuffing? The Difference Matters
It's important for victims to recognize the difference between breaches and credential stuffing attacks to respond appropriately
Re-engineering Cyber-Consciousness of the Human Element of Cybersecurity
How can orgs quantify the human element of cybersecurity?
#HowTo: Optimize Certificate Management to Identify and Control Risk
How should orgs approach certificate management in a distributed workforce?