Infosecurity Opinions
Don’t Get Complacent About Ransomware
When you live and breathe IT and information security, it is easy to forget that not everyone in your organization is on the same page.
How to Automate Governance, Risk and Compliance
Automating GRC systems is an effective way to implement a robust information security management system process whilst keeping costs low.
How to Quantify the Risk of an Insider Threat
Almost 80% of employee fraud takes place in accounting, operations, sales, senior management, customer service, and purchasing.
Phishing Simulations: Will They Cure Your Company's Susceptibility?
The holy grail of information security behavior change is upon us. Or so “they” would have you believe.
You’ve Got Email…Problems
One of the most contentious elections in modern history is finally over. The candidates and their surrogates mercilessly attacked one another’s character and reputations, inflicting wounds that will take a long time to heal. But beyond the personal reputations that suffered, there was something else that took an incredible beating: email technology.
Whaling 101 - What You Need to Know About CEO Fraud Email Attacks
Have you ever received an email out of the blue advising your parcel has “experienced an exception” or alerting you that you’re due a refund from your phone company and asking you to click a link?
When the Boundary Isn’t Enough: Accelerating Discovery, Investigation and Response
Depending on which study you are citing, anywhere between 50% and 95% of companies have already been breached.
A Glimpse into Database Scalability
Database scalability refers to the ability of a database to scale based on the workload it is subjected to.
Internal and External Ramifications of Leaked Board Strategies
Looking at breach response and how to prepare against the prospect of bad news.
IoT in the Home Requires a Complete Security Rethink
We're entering exciting times. Burgeoning technologies that were once stuff of science fiction look soon to become ubiquitous and commonplace.
How Can the NHS Protect Itself Against Cyber Attacks?
It’s not easy to put a cost on cybersecurity breaches in healthcare
Internal & External Ramifications of Leaked Board Strategies
Brian Stafford, board expert and CEO of Diligent, and Sandra Fathi, president and founder of Affect, respond to key questions that answer how to best protect board materials and what companies can do to prepare for future breaches
What Role Does Privacy Play in Your Digital Transformation Strategy?
There are two approaches that an organization can take to modernize digitally – ‘internal business process out’ or ‘customer experience in’
Stop and Think: Cybersecurity Best Practices for Black Friday and Cyber Monday
Eight simple tips that all shoppers can benefit from as we approach the holiday season
What Does the Role of CISO Look Like in 2016?
It is essential for CISOs and CIOs to continually advance their knowledge to stay ahead of the game
Keeping Today’s 'Smart Office' Secure
The internet today barely resembles the one from 15 years ago that gave birth to browsers, online research and Cyber Monday, and it continues to change on a daily basis
Workers Mix Business with Pleasure & the Security Impact is Colossal
Scott Millis, CTO, Cyber adAPT, warns that the growing trend of using a single device for all professional and personal interactions is causing huge headaches for security teams
Cybersecurity – Just Like Sex, Drugs & Rock ‘n’ Roll
Just like sex, drugs & rock ‘n’ roll – we have to adapt our own behavior to get all of the benefits and minimize the chance of short, medium or long-term damage
The Five Stages of Compliance Audit Grief
Any psychotherapist will tell you there are a range of mind states adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a compliance audit. The good news? You will get through it
The Why and How of Ransomware
Ransomware is undeniably becoming one of the biggest threats facing businesses today