Infosecurity Blogs

An Inside Look at Hive’s RaaS Tactics
The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary

Compliance vs Security: A Look into Passwords
New research shows that relying on compliant passwords does nothing to protect your network
Brought to you by
Specops

Digital Trust: From Brand Damaging to Brand Managing
How can organizations achieve consumer confidence in their security and privacy posture?

What You Should Do When Two-Factor Authentication Becomes a Security Requirement
The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses
Brought to you by
IS Decisions

How Ransomware Has Become a Geopolitical Risk for Governments
There has been a significant escalation in attacks targeting government organizations this year

The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe
Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?
Brought to you by
Forescout

Stand Down, Marketers: Zero Trust is Not a Product
If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size
Brought to you by
IS Decisions

Browser exploits: A Concerning Revival Led by the Lazarus Group
The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser

Modern Authentication for Multiple User Journeys - Best Guidance
If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout
Brought to you by
Thales

Cyber Essential’s Password-Based Authentication Requirements
Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape
Brought to you by
Specops

Let’s Rethink Cybersecurity Training Investment
We need to make training targeted to tasks we can realistically expect people to do

2022: A Checklist for the Year of Heightened Cyber Risk
Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks