Infosecurity Opinions
Cloud’s Silver Lining: Patching the Fluid Workforce
A new challenge is to maintain network changes in the long-term as many were implemented quickly and as a temporary solution
Kleptopredation in a Digital World
How malicious cyber actors increasingly leverage a hunting strategy borrowed from the world of marine biology, called Kleptopredation
The Future of Work and Protecting Your Cloud-Based Office from Cyber-Attacks
Not all businesses have the proper tech infrastructure in place to equip, support and manage productive remote working
#HowTo Build a Telegram Security Plan
Five ways to protect yourself with a telegram security plan
Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks
There is no foolproof method to ensuring you do not experience sinister cyber activity
The Anatomy of a SaaS Attack: Catching and Investigating Threats with AI
Little attention is given to how the TTPs in SaaS attacks differ significantly from traditional TTPs seen in networks and endpoint attacks
The Gig Economy: A New Battleground for Cybersecurity
The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.
DFIR, Threat Hunting, and Navigating COVID-19 Lockdowns
When it comes to advanced DFIR and threat hunting, being remote has proven cumbersome at best and highly restrictive at worst.
Why Microservices Require Unified Tools for Authorization
How do businesses handle microservice authorization controls?
Don’t Compromise: Securing Your Company’s Data Amid Remote Working and Lay-offs
How will healthcare companies' security recover after the pandemic?
Fixing the Biggest IoT Issue — Data Security
Without the introduction of the AIoT, the growth of applications across all areas of our lives would be significantly diminished
Grassroots Data Security: Leveraging User Knowledge to Set Policy
Deep learning gives us two tools to do it: representation learning and anomaly detection.
Building a Blueprint for a Successful Micro-segmentation Implementation
How organizations can implement and manage SDN-enabled micro-segmentation strategies
How Prepared is Your Business to Face Botnet Threats
To be on the safe side, you need to understand the implications of these attacks and know the precautions to take
#HowTo Choose a Link Analysis Tool
These tools visualize data and draw relationships between otherwise disparate pieces of information
Securing Smart Cities of the Future
Managing the cyber-risks of smart cities is crucial in realizing their potential
How Traditional Machine Learning Is Holding Cybersecurity Back
Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats
The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering
How to take ownership of your data’s security as part of your cloud strategy
Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back
As the internet expands, and bots become more essential to maintaining it
Creating a Modern Office that Appeals to Techy Staff
Creating a great work environment is essential.