Infosecurity Opinions
Working Smarter: Use Machine Learning to Merge IAM and SIEM
IAM and SIEM systems can give organizations the insight and clarity they so desperately need.
GDPR is Not a Ticking Timebomb for Huge Fines
Organizations are being told that on the 25th May they will go into compliance meltdown: It’s all got a bit out of hand to be honest.
Why Cyber Insurance Works
Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.
Building a Security Culture in the Age of GDPR
GDPR will present an opportunity to evolve from a systems-based approach to a data-driven one.
Spectre and Meltdown: Powerful Reminders of Side Channel Attacks
Many organizations had a recent experience with side channel attacks when security researchers announced the discovery of Meltdown and Spectre.
Does Ransomware-as-a-Service Enable More Cyber-Criminals?
Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.
The Tesla Hack is a Serious Cryptojacking Warning
The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.
Cryptojacking: Back to the Future
Cryptojacking is the perfect combination of two of the Internet's hottest trends - rampant hacking and the massive growth of cryptocurrencies.
Preventing the Next Ransomware Attack
While there is no simple solution to protect against ransomware attacks, there are a few key tactics that security teams can take that will boost their immunity.
Cryptocurrency Hacking Raises Threats of Financial Vulnerability
A dependence on cryptocurrencies increases, we will see more and more social engineering attacks used to steal digital coinag
Why There is Still a Role for VDI in the Security World
Despite the rush to move applications to the cloud, VDI’s security benefits mean it still has a place in today’s corporate networks.
Explicit Content at Work: The Dangers of Unrestricted Internet Access
The dangers of unrestricted internet access leaving corporate data open to cyber-criminals.
Does Patching Make Perfect?
The process of installing updates and patches has become so highly complex that it, in and of itself, may create new complications.
Is Your City Smart Enough to Tackle GDPR?
The success of productivity and efficiency, ushered in by the IoT revolution, has given rise to a new breed of connectivity: the smart city.
Cloud Data Remains Your Responsibility
Your data may be held in an external cloud, but you cannot abdicate your own security responsibilities.
Advanced Phishing Threat Protection Requires Security at the Mailbox Level
Because it is inevitable that phishing messages will land in employees’ inboxes, it is essential that every employee have mailbox-level detection.
Government Needs to Get Serious About Text Messaging
Our government is far too lax with its communication policies and lets employees get away with unregulated, unsecure and inappropriate communication.
Is GDPR a Tax or an Incentive?
The common perception is that security and compliance activities reduce profit margins.
The Compliance Conundrum
Why should businesses be trusting public cloud services with their compliance needs?
Gender Inequality in Information Security
The fact of the matter is that we have a culture in our industry that isn’t inclusive of women.