Infosecurity Opinions
How to Encourage Employees to Not Only Practice, but Actually Promote Cybersecurity Awareness
How to Encourage Employees to Not Only Practice, But Actually Promote Cybersecurity Awareness
The Connected World: ‘With Great Power Comes Great Responsibility’
The connected world becomes more and more embedded in the way we function, play and work.
IoT Denial of Service Botnets and SCADA Attacks to Plague 2017
With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead
What is the Real Cost of DNS Security Attacks to UK Business?
Around 20 percent of businesses have been subject to cache poisoning (data corruption) in the past 12 months – more than US organizations, along with a higher amount of DNS Amplification attacks.
Porn Gets Pwned: for Hackers, XXX Means Exploit, Extort and Expose
The xHamster breach is the latest in a string of compromises involving adult websites, including Ashley Madison, FriendFinder, Brazzers and Pornhub. Hackers may be targeting these sites not simply because of their lacklustre security, but because the sensitive information they house can be easily monetized via blackmail.
How will Mirai Emerge in 2017?
Although a certain level of technical capability is required to install and operate Mirai, it has the potential to act as a force multiplier for a range of actors engaging in DDoS attacks, including hacktivists, extortionists, and politically-inspired actors.
How to Build a Culture of Cybersecurity
In spite of the highest levels of management insisting that it is a priority to protect data, why is it that some of us take those enabling actions? Why isn't everyone on board with cybersecurity?
Failing to Prepare is Preparing to Fail with Network Security
What, though, can companies do to help ensure that they are protected against enormously damaging breaches? A look at how organizations can help ensure their networks, sensitive data and other critical infrastructure are safeguarded from the huge number of threats now in play.
Raising the Stakes: Serious Cyber Security Preparations for 2017
The four trends, according to the ISF, that will shape the world of cybersecurity in 2017.
The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach
Quantifying the financial impact of a data breach before it occurs is like assuming you can win roulette using insider trading
Password Alternatives: How to Secure your Enterprise's Data
There are two challenges with consumer security awareness — or lack of security awareness — that IT professionals need to take into account with passwords.
Spoiler Alert: How Better Access Management and File Auditing Could Change Hollywood History
Gone are the days when hackers are represented as anti-social nerds in dark rooms furiously tapping on their keyboards.
Fighting Fire with Fire – AI, Cyber Security, and Roles of the Future
Artificial Intelligence (AI) as a subject has been around for years, however it is only now that AI as a real possibility is bleeding into public consciousness.
How Security by Design can Boost Business Agility
However, with a fixed set of resources and a constrained capacity to deliver on new projects, IT is often accused of holding the business back rather than enabling it.
Hygiene First, Turbo-Powered Cyber Machine-Learning Predictive Analytics Ninjas Second
CISOs often find that they don’t have good visibility into the state of hygiene across their estate. Yet when they do start digging, they find there’s a lot of gaps.
Don’t Get Complacent About Ransomware
When you live and breathe IT and information security, it is easy to forget that not everyone in your organization is on the same page.
How to Automate Governance, Risk and Compliance
Automating GRC systems is an effective way to implement a robust information security management system process whilst keeping costs low.
How to Quantify the Risk of an Insider Threat
Almost 80% of employee fraud takes place in accounting, operations, sales, senior management, customer service, and purchasing.
Phishing Simulations: Will They Cure Your Company's Susceptibility?
The holy grail of information security behavior change is upon us. Or so “they” would have you believe.
You’ve Got Email…Problems
One of the most contentious elections in modern history is finally over. The candidates and their surrogates mercilessly attacked one another’s character and reputations, inflicting wounds that will take a long time to heal. But beyond the personal reputations that suffered, there was something else that took an incredible beating: email technology.