Infosecurity Opinions
Is it Time to Rethink Cybersecurity Training?
What businesses can do to engage/educate their employees more effectively.
Combating the Rising Cyber Threat Against ICS
ICS systems face a continual threat of attack, and the risk is growing
#HowTo Support a Zero Trust Model with Automation
How security and IT operations teams can implement Zero Trust and improve the security posture across hybrid cloud infrastructures.
Is it Time for the Network to Shoulder More of the Burden of Information Security?
It’s time ISPs became allies rather than observers
Security Initiatives Businesses Must Adopt to Survive in This New World
If organizations fail to adapt to this new reality, it could leave them unable to pivot quickly
Decrypting Diversity and Inclusion in Cybersecurity
How to improve awareness of opportunities for women and help sustain from STEM to the workforce
The Unintended Data Security Consequences of Remote Collaboration
Every Team or chat created is yet another potential exit point for sensitive data.
Using Security Automation to Stay a Step Ahead in these Challenging Times
How to use automation throughout security efforts to better focus resources and build assurance into security controls and operations
#HowTo Create a Hybrid Remote and Office Work Model
Five ways IT and security managers can plan for a hybrid work model
Don’t Cut Corners while Running LAPS
Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.
The Cyber Sleeper Cells Lying in Wait for the Return to the Office
Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices
Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?
There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm
The Ongoing Threat of Telecoms Fraud
It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.
Overcoming Healthcare’s Cybersecurity Challenges
Six recommendations for improving cybersecurity in healthcare
Partitioned Endpoints Pair Security with Convenience for Home Working
An endpoint architecture to enable safe, secure and productive home working.
#CyberMonday Risks of a Locked-Down Festive Period for Online Retailers
It’s highly likely that retailers will still be relying heavily on their online operations to make much needed sales before Christmas.
2020 Was the Year of the Great VPN Comeback, or Was It?
In this era of remote and mobile work, legacy, hardware-based VPNs have passed their prime
Bot is the New Black (Friday): How Retailers Can Fight Back
Black Friday isn’t only time retailers have to worry about automated shopping bots
Why Twitter’s High-Profile Users Need to Personally Embrace Security
This is an indication of the importance Twitter holds to those in the higher ranks of society.
Authenticate and Survive – Why Current Options Are Better than Ever
As employees gain more access to important information, the need for greater security increases.