Infosecurity Opinions
Who is Responsible for Encryption Keys?
Once the GDPR is in full force, there will be thousands more data privacy officers in Europe, tasked with protecting personally identifiable information as it moves within and beyond the organizational boundary.
A Trumped-Up Approach to the Borderless War on "the Cyber"
What can we make of President Trump’s public statements on cybersecurity? Where will cybersecurity leadership come from and how will policy be shaped by the status quo and unforeseen foreign policy crises yet unimagined?
Why Cybersecurity Is More Important Now Than Ever
Despite which side of the political aisle your ideas land on, there is little debate that cybersecurity continues to be a hot issue. However, the debate over how best to go about treating these threats swiftly and amicably rages on.
Multi-Layer Security is Essential for Public Sector Networks
Public sector networks are prime targets for cyber-attacks. From criminal gangs looking to exploit sensitive personal information to hackers with political agendas threatening national security, public sector organizations face some of the most dangerous cyber-threats.
Building Security Layers – of Software
What can be done about major attack tactics in 2017?
UK Businesses Must Use the Apprenticeship Levy to Boost Cybersecurity Skills
This is a massive opportunity for UK businesses to close their cyber skills gap. But what is the Apprenticeship Levy, and how will it revolutionise IT security?
How to Hold on to Your Workforce During the Job Hunting Season
Losing employees can pose a serious organizational challenge. With the cost of employee turnover estimated to be as much as 1.5 to 2 times an employee’s salary, how can companies retain their workforce and protect their bottom lines?
Web Isolation: The Evolution of Enterprise-Ready Isolation
Isolation is based on the concept of creating an “air-gap” between the web and users, to eliminate the possibility of threats reaching and infecting devices.
Cybersecurity in 2017: Recruitment is Key
As the cost and frequency of breaches continue to increase, companies are learning the value in investing in the improvement their cybersecurity systems.
Why Containerisation Matters More Than Ever Before
As organizations mobilize, they cannot afford to compromise corporate security: yet mobility is in a constant state of flux, with new innovations in communication, collaboration and productivity-enhancing technology continuing to disrupt and confound conventional security practices.
How to Outsource Security Services: Tips for Small Businesses
Considering the sophisticated cyber-attacks which SMBs may face, it’s not particularly practical to form an IT team to monitor the network and keep an eye on regular employees’ activities.
Cyber Insurance: Coming of Age in 2017?
As large-scale attacks and disclosures of massive data-breaches were reoccurring along the year, we realized once again that allocating tremendous efforts and resources to your cybersecurity defense does not provide any guarantee you won’t experience an incident.
The Fog of the Cybersecurity Challenge
Gearing an educational system to train workers at a rate ten times the current levels currently achieved by colleges and universities, and in just three years, does seem a massive challenge!
Want Stronger Network Security? Pay Attention to Your Packets
We are facing a crime scene built from a complex structure of servers, networks and applications, scattered across many different geographical locations
Securing the Connected Car
Often dubbed a “data center on wheels,” the connected car is one of the fastest-growing markets in the ecosystem that makes up the Internet of Things (IoT).
Advancing Infosecurity Standards Through Consensus
As a collaborative process, consensus is designed to satisfy a wide group through inclusion, information and participation.
How to Encourage Employees to Not Only Practice, but Actually Promote Cybersecurity Awareness
How to Encourage Employees to Not Only Practice, But Actually Promote Cybersecurity Awareness
The Connected World: ‘With Great Power Comes Great Responsibility’
The connected world becomes more and more embedded in the way we function, play and work.
IoT Denial of Service Botnets and SCADA Attacks to Plague 2017
With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead
What is the Real Cost of DNS Security Attacks to UK Business?
Around 20 percent of businesses have been subject to cache poisoning (data corruption) in the past 12 months – more than US organizations, along with a higher amount of DNS Amplification attacks.