Infosecurity Opinions
Securing Remote Operations with Digital Identity Management
Why identity management, on premise and as a service, is crucial to maintain remote worker security
Evolution to Becoming a Modern Day CISO
A CISO has to act as an educator, coaching and empowering both technology teams to understand the business goals
Forget Protection: Is Your SOC Ready to Defend?
Rebuilding the SOC means rethinking the roles of people who work in them
Cloud’s Silver Lining: Patching the Fluid Workforce
A new challenge is to maintain network changes in the long-term as many were implemented quickly and as a temporary solution
Kleptopredation in a Digital World
How malicious cyber actors increasingly leverage a hunting strategy borrowed from the world of marine biology, called Kleptopredation
The Future of Work and Protecting Your Cloud-Based Office from Cyber-Attacks
Not all businesses have the proper tech infrastructure in place to equip, support and manage productive remote working
#HowTo Build a Telegram Security Plan
Five ways to protect yourself with a telegram security plan
Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks
There is no foolproof method to ensuring you do not experience sinister cyber activity
The Anatomy of a SaaS Attack: Catching and Investigating Threats with AI
Little attention is given to how the TTPs in SaaS attacks differ significantly from traditional TTPs seen in networks and endpoint attacks
The Gig Economy: A New Battleground for Cybersecurity
The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.
DFIR, Threat Hunting, and Navigating COVID-19 Lockdowns
When it comes to advanced DFIR and threat hunting, being remote has proven cumbersome at best and highly restrictive at worst.
Why Microservices Require Unified Tools for Authorization
How do businesses handle microservice authorization controls?
Don’t Compromise: Securing Your Company’s Data Amid Remote Working and Lay-offs
How will healthcare companies' security recover after the pandemic?
Fixing the Biggest IoT Issue — Data Security
Without the introduction of the AIoT, the growth of applications across all areas of our lives would be significantly diminished
Grassroots Data Security: Leveraging User Knowledge to Set Policy
Deep learning gives us two tools to do it: representation learning and anomaly detection.
Building a Blueprint for a Successful Micro-segmentation Implementation
How organizations can implement and manage SDN-enabled micro-segmentation strategies
How Prepared is Your Business to Face Botnet Threats
To be on the safe side, you need to understand the implications of these attacks and know the precautions to take
#HowTo Choose a Link Analysis Tool
These tools visualize data and draw relationships between otherwise disparate pieces of information
Securing Smart Cities of the Future
Managing the cyber-risks of smart cities is crucial in realizing their potential
How Traditional Machine Learning Is Holding Cybersecurity Back
Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats