Infosecurity Opinions
How Hybrid Learning is Changing K-12 Cybersecurity
It’s up to everyone to keep cybersecurity, student safety, and data privacy top-of-mind through this shift.
Securing Remote Desktops During a Pandemic
Remote work is needed to ensure everyone has the flexibility they need to be productive under unpredictable circumstances.
Renew Your Vulnerability Management Program
Organizations should invest in vulnerability scanning solutions to gain visibility into all assets and vulnerabilities.
Maintaining Remote Workforce Productivity Without Peaking Privacy Concerns
COVID-19 has generated a new surge in popularity for surveillance technologies
Compromised Devices Await Office Return to Strike
Remote working has also put an increased focus on identity access management, credential theft, and privilege escalation
Is Your Organization Ready to Defend Insider Threats?
How can you assess your organization’s readiness to detect and respond to an Insider threat attack?
Sleepwalking into a Cybersecurity Nightmare?
Now is the time for investing in and implementing technologies
Making Cybersecurity a Priority in the Boardroom
The top five cybersecurity governance challenges, and levers to solve them
#HowTo Create a Budget-Friendly Security Testing Program
Compromising on application security testing can have serious implications, and it is important to not skip it.
The Glaring Vulnerabilities in Power Distribution Networks Today
Legacy industrial control system protocols are commonly used throughout power systems, and have little or no security measures and lack authentication capabilities.
Web Application Threats: Mapping Out Your Attack Surface
Security teams must gain a better understanding of weakness in their application architecture in order to reduce their overall attack surface.
A CISO For The 2020s – More Than Just a Dashboard Driver
The CISO of 2020 is one who is aware of all this and is willing to innovate.
Vaccine Developers are at Risk: How to Fight Hackers and Address the Health Crisis
Pharmaceutical organizations researching a vaccine are taking the right steps toward a strong security posture
COVID-19 Vs Data Center? Best Practices to Weather the Storm!
How the shift will affect data center operators and what they can do to efficiently tackle it
Overcoming the Ongoing Exploitation of Vulnerabilities
Looking at 2020 data to determine what cyber-criminals actions have been
Commercializing Health Data: Where do we Draw the Line?
What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?
COVID-19 Demonstrates Need for Human Error-Proof Security
80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security
How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy
There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.
#HowTo Evaluate the Security of New Applications
Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable
Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?
In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN