Infosecurity Opinions
IoT in the Home Requires a Complete Security Rethink
We're entering exciting times. Burgeoning technologies that were once stuff of science fiction look soon to become ubiquitous and commonplace.
How Can the NHS Protect Itself Against Cyber Attacks?
It’s not easy to put a cost on cybersecurity breaches in healthcare
Internal & External Ramifications of Leaked Board Strategies
Brian Stafford, board expert and CEO of Diligent, and Sandra Fathi, president and founder of Affect, respond to key questions that answer how to best protect board materials and what companies can do to prepare for future breaches
What Role Does Privacy Play in Your Digital Transformation Strategy?
There are two approaches that an organization can take to modernize digitally – ‘internal business process out’ or ‘customer experience in’
Stop and Think: Cybersecurity Best Practices for Black Friday and Cyber Monday
Eight simple tips that all shoppers can benefit from as we approach the holiday season
What Does the Role of CISO Look Like in 2016?
It is essential for CISOs and CIOs to continually advance their knowledge to stay ahead of the game
Keeping Today’s 'Smart Office' Secure
The internet today barely resembles the one from 15 years ago that gave birth to browsers, online research and Cyber Monday, and it continues to change on a daily basis
Workers Mix Business with Pleasure & the Security Impact is Colossal
Scott Millis, CTO, Cyber adAPT, warns that the growing trend of using a single device for all professional and personal interactions is causing huge headaches for security teams
Cybersecurity – Just Like Sex, Drugs & Rock ‘n’ Roll
Just like sex, drugs & rock ‘n’ roll – we have to adapt our own behavior to get all of the benefits and minimize the chance of short, medium or long-term damage
The Five Stages of Compliance Audit Grief
Any psychotherapist will tell you there are a range of mind states adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a compliance audit. The good news? You will get through it
The Why and How of Ransomware
Ransomware is undeniably becoming one of the biggest threats facing businesses today
Tools of the Trade: Browsing Through the Hack Store
By learning how to use free or low-cost downloadable and widely available tools, hackers can empower themselves over just about any mobile or desktop device, as well as over supposedly secure on-line network
Important Tips for Updating Your Breach Response Plan
Dan Sarel, co-founder and VP of product management at Demisto, explores the importance of having an effective breach response plan
An Information Security Survival Guide
Shred-it's Andrew Lenardon walks through the fives steps to a culture of security
Four Applications You Should Blacklist Today
It is important that companies take a proactive approach to blacklisting and removing high-risk applications or applications that have entered end-of-life
Noisy Fans & Fake Deli Coupons: How Hackers are Winning Now
In the race to come up with new and more sophisticated ways to invade victims' computers and networks, hackers will use any means necessary – even a computer's fan
Protect Your Enterprise by Balancing WordPress Plugins
SiteLock President Neill Feather and Crowd Favorite CEO Karim Marucchi outline what enterprises should consider in order to protect themselves from exposure via WordPress, mitigate cyber risks, and still ensure a pleasant online user experience
Preventing Privileged Account Abuse
Fraud or theft that occurs as a result of privileged account abuse is one of the most challenging for organizations to identify
Edge Computing & Security: Rethinking Compliance & Data Protection in a Mobile-First Environment
IT today is no longer solely linked to specific machines sitting on desks; the growth of mobile and remote working means that users have more options on what devices they use, how they use them and where they get work done
How Can We Achieve 50/50 Gender Parity in Cybersecurity?
Lucy Chaplin, associate of (ISC)², manager at KPMG, on how the company tackled the gender gap in security