Infosecurity Opinions
Top Cybersecurity Training Priorities
With new legislation coming into play in 2018 and the constant onslaught of ever-changing threats, it can be hard to determine where one should concentrate cyber efforts.
Hyper-Convergence and the Need for Greater Encryption
The challenge of encryption and hyper converged infrastructures.
Moving to the Cloud, but Stuck in the Past
Security architectures have become the biggest area of friction when moving to the public cloud.
Changing Face of DDoS and Threats to the Web Application Layer
It is clear that Mirai is still very much a disruptor, but over a year later, we can ask what lessons have been learned, and where we go to next.
Trust Wanes, Mitigation Reigns and a Mind-Set Change in 2018
The (mis)happenings of 2017 have illuminated poor practice and should serve as a call to action to individuals and businesses.
Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business
VDRs serve as the modern gold standard in information security.
Phishing Simulation Training Escalation
One area of phishing simulation training that may not have matured is that once the metrics are analyzed, what do you do with the repeated clickers?
Coprocessor Attacks: the Hidden Threat
Coprocessors typically run their own firmware which—like any other computer code—can be vulnerable to attack.
Past and Present Tactics of Ransomware Attacks
Choosing the ransomware delivery mechanism is mostly a question of money.
What Does Data Loss Mean for Your Business?
Businesses need to get serious about data protection if they don’t want to be exposed to significant risks.
Understanding the Strengths and Weaknesses of Biometrics
Significant advances have now made biometric authentication a truly viable and secure alternative to traditional forms of security.
Securing Smart Devices Requires Smarter Partnerships
While there are few IoT device vendors focused on adding security, this presents a big opportunity for manufacturers willing to be proactive in implementing and educating the market about the need for stronger security.
The Evolution of Corporate Authentication
While it’s easy to feel overconfident if you’ve been lucky enough to avoid this type of problem, complacency can harm your business.
Key Questions any CEO Should ask Before Moving to the Cloud
As your organization makes the move to the cloud, managing security risks should be on the top of your list.
Fighting on Today's Front Lines
The overall impression is that data breaches are the result of enemy nation states, hacktivists, organized crime, and other evil forces,
Believe It: Cybersecurity is Getting Better, Not Worse
We’ve become beholden to our own fear, uncertainty, doubt – which basically says that cybersecurity has never been worse.
To Mitigate Phishing Risk, Let Employees 'Fail Forward'
Learning from mistakes is vital to a strong anti-phishing program.
'Zero Trust' Security Will Make A Comeback in 2018
Zero trust controls will allow careful scrutiny of how to raise cybersecurity defenses.
Is Your Social Media Strategy More Of A Cybersecurity Faux Pas?
You can’t stop staff members using social media, but you can effectively train and continuously educate them about the hazards.
Is The NCSC Doing Enough to Protect us from Today's Cyber Threats?
How successful has the NCSC been to date? What else can be done to safeguard the UK against a relentless cybersecurity onslaught?