Infosecurity Blogs

Password Security for Furloughed Employees
Companies must continue to consider cybersecurity regarding furloughed employees
Brought to you by
Specops

Cloud Services Are Top-of-Mind for Phishers
The growth in cloud adoption is changing the phishing landscape

DDoS Ransom Attacks: What You Need to Know
Adverse impacts of a ransom attack can be curbed if dealt with swiftly
Brought to you by
Indusface

Premier League Teams Train Together in Defense Against Cyber-Attacks
The English Premier League is a high-value target for would-be cyber-attackers
Brought to you by
Specops

Security by Design Implementation Insights
How can orgs implement a successful security-by-design strategy

Healthcare Carries a Large Target for Ransomware
How can healthcare orgs protect themselves from the threat of ransomware?

CISO Stories: Part One
Part one of Nadine Michaelides’ CISO Stories series tells the tale of a CISO working in the chemical industry

The Future of Crypto and Casinos
Cyptocurrencies find their way into many industries as secure payment options, including gambling
Brought to you by
TopOnSEO

Zero Trust in the Post-Pandemic Era
Security concepts like Zero Trust represent what we need to strive for in the post-pandemic era
Brought to you by
SecureLink

Global Focus on Supply Chain Security Has Transformational Impacts for SMBs
How should small businesses look to develop their security in the current landscape?

Social Engineering and the IT Service Desk
The pandemic has provided a perfect opportunity for many types of social engineering attacks
Brought to you by
Specops

ISO 27701: A Pathway to Privacy and Regulatory Compliance
Answers to some commonly asked questions regarding ISO 27701
Brought to you by
Lloyd's Register