Infosecurity Opinions
Protecting Your Online Services From DDoS Attacks
Practical advice and real experiences of surviving DDoS attacks
Developers are in the Driver’s Seat: What Does it Mean for Security?
In this evolving model, security takes on a consultative role for developers focusing on policy, governance, and oversight
The World Has Changed - Here’s How to Get the Board to Realize It
Enterprise IT has changed dramatically in the last year, but that doesn't mean that the conversation has changed the boardroom.
Think Like an Attacker: Effectively Addressing Targeted Phishing and Fraud
With threat activity continuing to rise, it’s crucial that organizations stay vigilant in identifying and remediating threats posed to them.
Keeping Up With the Uncertainty of Shifting Global Data Protection Regulations
Examining some of the biggest changes seen in 2020, what the next year holds for businesses, and how organizations can remain compliant across the world.
Protecting Asia Pacific Businesses’ Online Presence
Security concerns, local requirements and regulatory issues are just some of the domain management challenges companies are facing in the region.
3-2-1, No Thank You
It is always the data owner’s responsibility to keep copies of their data.
Preparing for Disaster: How UK Healthcare can Ready Itself For a Ransomware Onslaught
UK healthcare need to build on best practices to help with prevention, enhancing resilience and rapid threat detection and response
What the NIST Framework Misses About Cloud Security
The four things the NIST framework misses, and one that is spot on
Why Are More People Not Automating Certificate Management?
What is scaring enterprises away from automation?
Prevent Ransomware From Taking the Podium With Layered Security
It’s crucial organizations understand and know how to defend themselves from what is now often a sophisticated, three-stage attack.
The Three Characteristics of a Defensible Security Program
Principles to help you continuously improve the effectiveness and efficiency of your security controls
Automated Penetration Testing – Can it Replace Humans?
Are human pen testers heading for redundancy, and can we replace them with tools?
How Should CISOs Combat Rising "Soft" Attacks?
Defending against the more targeted “soft attack”
#HowTo: Optimize Your 2021 Security Spend
How do you reduce your security risk with tightened budgets?
Security from the White House
How President-elect Joe Biden can tackle a challenging cybersecurity landscape.
From BIAS to Sweyntooth: Eight Bluetooth Threats to Network Security
Bluetooth has a history of vulnerabilities that continues to put corporations at risk of a major security breach
#HowTo Write the Perfect Op-Ed, and Get it Published!
Outgoing deputy editor Dan Raywood offers advice on how to produce the perfect opinion article
Credential Stuffing – Are You Doing Enough?
Why an old style attack just will not go away.
Financial Services Industry Under Attack from a Surge in Credential Stuffing
Compromised credentials are a threat to multiple sites when a data breach occurs