Infosecurity Opinions
Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?
Industry-wide initiative is a necessity to ensure hospitality corporates stand the best chance to succeed
Why Do Kubernetes and Containers Go Hand in Hand with Machine Learning?
Containers allow data to work on their Machine Learning and Artificial Intelligence programs and improve them significantly
Virtual Cybersecurity Professionals Needed During Times of Uncertainty
Virtual Cybersecurity Professionals are the latest trend in cybersecurity hiring
Too Many Vulnerabilities, Too Little Time
Why risk-based vulnerability management needs to be predictive
Moving to the Work From Home SOC
Troubleshooting is harder when remote
How Cloud-Based Training Can Better Enable Remote Workers
The cloud, after all, is designed to suit the needs of a distributed workforce
How You Can Avoid an IoT Doomsday
The slightest misconfiguration or poor security practices can serve as a point of entry for sophisticated cyber-attacks
#HowTo Cut Costs in the SOC
Ways where you can reduce costs but not efficiency in your SOC
Data Security is Everyone’s Problem
Data security must be management-led, and followed by everyone.
GDPR Two Years On – Has it Gone How we Hoped?
Two years on, did the introduction of the GDPR go as planned?
Why the Industry Needs to Step Up Action on Malicious Domains
Why steps need to be taken to stamp out malicious domains more than ever
Bank Data Integrity and #COVID19: Stop Copying Your Data!
Thanks to COVID-19, everything is disrupted – including how banks handle data security
Breaking Cryptography: Securing Machine Identities in a Post-Quantum World
The next quantum generation of machine identities could be unhackable
Overcoming the Unique Challenge of Securing OT in the Digital Era
High-value industries powered by OT are attractive targets for cyber-attacks
Mal-Innovation on Mobile: A Changing Threat Landscape
When it comes to enterprise mobile security, innovation is the biggest hurdle to overcome
Making Security a Business Priority: Four Things to Communicate to Leadership
Four talking points IT teams can better communicate to avoid a catastrophic cyber incident before it’s too late
Will COVID-19 be the Catalyst to Finally Replace Passwords With Biometrics?
Could Coronavirus be the catalyst that pushes us to swap out passwords for more secure and private authentication protocols?
How Bots Can Attack Your Web Application – And How To Stop Them
A new focus on sophisticated bots is emerging and how to spot real users from imposters
Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners
Zero Trust Application Access can literally be a game changer for organizations
Viruses Still Spread, Get Ready for Containment
It’s essential that management be capable of immediate containment, isolation and eradication of these threats.