Infosecurity Opinions
The Future of Work and Protecting Your Cloud-Based Office from Cyber-Attacks
Not all businesses have the proper tech infrastructure in place to equip, support and manage productive remote working
#HowTo Build a Telegram Security Plan
Five ways to protect yourself with a telegram security plan
Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks
There is no foolproof method to ensuring you do not experience sinister cyber activity
The Anatomy of a SaaS Attack: Catching and Investigating Threats with AI
Little attention is given to how the TTPs in SaaS attacks differ significantly from traditional TTPs seen in networks and endpoint attacks
The Gig Economy: A New Battleground for Cybersecurity
The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.
DFIR, Threat Hunting, and Navigating COVID-19 Lockdowns
When it comes to advanced DFIR and threat hunting, being remote has proven cumbersome at best and highly restrictive at worst.
Why Microservices Require Unified Tools for Authorization
How do businesses handle microservice authorization controls?
Don’t Compromise: Securing Your Company’s Data Amid Remote Working and Lay-offs
How will healthcare companies' security recover after the pandemic?
Fixing the Biggest IoT Issue — Data Security
Without the introduction of the AIoT, the growth of applications across all areas of our lives would be significantly diminished
Grassroots Data Security: Leveraging User Knowledge to Set Policy
Deep learning gives us two tools to do it: representation learning and anomaly detection.
Building a Blueprint for a Successful Micro-segmentation Implementation
How organizations can implement and manage SDN-enabled micro-segmentation strategies
How Prepared is Your Business to Face Botnet Threats
To be on the safe side, you need to understand the implications of these attacks and know the precautions to take
#HowTo Choose a Link Analysis Tool
These tools visualize data and draw relationships between otherwise disparate pieces of information
Securing Smart Cities of the Future
Managing the cyber-risks of smart cities is crucial in realizing their potential
How Traditional Machine Learning Is Holding Cybersecurity Back
Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats
The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering
How to take ownership of your data’s security as part of your cloud strategy
Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back
As the internet expands, and bots become more essential to maintaining it
Creating a Modern Office that Appeals to Techy Staff
Creating a great work environment is essential.
Using Machine Learning to Transform Data into Cyber Threat Intelligence
Combination of threat analysis and data analysis with machine learning can help security teams turn raw data into cyber threat intelligence.
Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach
Steps IT teams can take to achieve better cybersecurity for your remote workers.