Infosecurity Blogs

The Vulnerability of the UK's 'Just in Time' Supply Chain
Why the resilience of the UK’s supply chain against cybercrime can be significantly improved

'Hack One, Breach Many' Is Here to Stay: How to Secure Your Third-Party Risks
‘Hack one, breach many’ is here to stay so secure your access points before it’s too late

2022 – Predictions for the Year Ahead
Javvad Malik reveals some of the cybersecurity trends he expects to come to fruition in 2022

3 Reasons Why DDoS Protection Fails
Improved DDoS skills and knowledge translate into the effects of an attack being mitigated quickly

Cloud Security Best Practices: Stop Making Your Cloud Rain Shells
With more sensitive data kept in the cloud as organizations move to cloud networks, security must be at the forefront

Mitigating Cloud Security's Greatest Risk: Exposure
Why increasing cloud complexity is making security as challenging as ever

Why Is Data Destruction the Best Way to Impede Data Breach Risks?
Devices no longer needed are required to be wiped permanently with a certified data sanitization tool

Challenges of Industrial Cybersecurity
A sense of urgency is needed to address the unique needs of OT

Can the CISO Reporting Line Reveal Intel on Data Breach Causation?
How can we achieve full transparency of data breach causation?

AI Progress in Security is Impressive Enough Without Embellishment
Any claims that products and solutions are magically all-powerful due to AI are counterproductive

Healthcare Cybersecurity: Threats and Mitigation
Healthcare is an increasingly attractive target for cyber-criminals, and extensive security measures are required

How Automation Can Solve the Security Talent Shortage Puzzle
It’s simply impossible for humans to respond effectively to such a deluge through manual efforts alone

Bridging the IT, Security and Developer Divide to Deliver Innovation at Speed
How the gulf between IT, security and development can be bridged to deliver faster innovation

Cybersecurity is Critical at Christmas – Here's Why
Rising online shopping is providing a huge opportunity for cyber-attackers

Shifting Left with Pre-Commit Hooks
Why shifting-left means less burden on security shoulders and improved time to remediate

This Holiday Season, Don't Forget to Prepare Your Organization for Cyber-Threats
Cyber-attacks during holidays are preventable with an effective, intelligent and managed security solution


Ransomware is Everywhere, But are Organizations’ Defenses too Little, too Late?
With ransomware becoming more prevalent, cyber defenses need to evolve beyond tools and focus on end-user behaviors

Recognizing the Importance of Operational Security
Rob Acker explains why effective operational security has never been more important

SEO Poisoning: The New Normal Brings New Threats
SEO poisoning demonstrates the acknowledgment of attackers that remote and hybrid business models have resulted in increased use of the browser





















