Infosecurity Opinions
UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?
If we don’t take action and follow government guidelines on IoT, then Parliament will be forced to enact legislation.
Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts
Companies are adopting privileged account technology to monitor behavior and secure their sensitive data.
GDPR is a Good Idea For US Companies, Even if it is Not Law
On the dawn of GDPR, and with the spotlight on major data breaches, perhaps the US is ready to take another run at data privacy regulation.
GDPR is Here, So What's Next for Cybersecurity Professionals?
The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.
Why Supply Chain Security Should be a Strong Link
Supply chain threats warn that the UK should expect a higher volume of attacks, but also ones with an increased amount of planning.
Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach
The Equifax breach and WannaCry ransomware may have nothing in common, but both involved hackers who exploited unpatched vulnerabilities in Windows 7 and Windows 8.
Communication, Collaboration & Orchestration: 10 Vital Steps to IT Alerting Automation
The challenge for companies is to plan for major IT incidents before they occur and, be able to respond with required velocity, control and communications.
Why the Adoption of Edge Computing Demands a New Approach to Data Security
Edge computing is defined as moving data processing power to the “edge” of a network, and processing this information at the edge allows for faster response times and consistent data collection.
Fighting Fire With Fire: AI's Role in Cybersecurity
AI’s ability to make automated decisions means it is revolutionizing the cybersecurity landscape, from both a defensive and offensive perspective.
How UK Government Policy and Regulation Ensure Cybersecurity Investment Continues To Thrive
Cybersecurity is becoming an important engine for the creation of British jobs and is a strategically important sector for the country’s defense.
Seizing the Benefits of AI and IoT Through Data Security
The new era of connectivity has introduced disruption for many businesses.
Navigating the Five Frequent Hazards of IT Security
Five reasons why security technology implementations commonly fail.
Whose Team Is Artificial Intelligence On: The Corporations or Hackers?
As we create more innovative solutions like AI, do we open up the gates to potentially more dangerous and common attacks?
How Businesses Need to Adapt Security Frameworks for the Office of the Future
IT and data security leaders will have to invest time and effort in network and device security solutions to allow workers the freedom to work and collaborate remotely.
Are Smart Cities Smart Enough to Tackle Cyber Attacks?
How smart cities can be security nightmares, but with the right regulation could there be a bright and secure future?
Microsoft's Commandment: Thou Shalt Not Worship (Password) Idols
Active Directory centralizes authentication and authorization for domain resources, but also creates a critical single point of failure.
Preventing the Cloud from Becoming a Digital Dumping Ground
Cloud has perhaps had the biggest impact on security owing purely to its scale.
How to Secure Your Data, Smart Tech, and Digital Assistants
AI devices open up a slew of privacy questions that leave businesses stuck choosing between efficiency and data security.
Security Analyst: The New Data Scientist
Data science skills have become more common as Universities offer a wide selection of courses on the subject.
Standardization in the Year of the Chatbot
Successful organizations will be asking not only what AI – or more automation – can do for them, but how they can adapt processes and security protocols to AI.