Infosecurity Blogs
Time for Infosec Professionals’ Imaginations to Stretch to Outer Space
Cybersecurity must be at the heart of the development of the space sector
Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks
Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021
The Benefits of Unified Physical Security Systems
Unified security systems can greatly enhance business operations
The Risk of Collaboration Apps
How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?
How Hackers Use Cloud Services to Make Cybercrime More Profitable
Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.
The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?
Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.
A Story of Human Error and Revenge
Organizations must understand how employee stress can lead to cybersecurity errors
Too Much Trust?
Have security pros been too relaxed about cyber-threats during the pandemic?
Addressing Burn Out in Cybersecurity Teams
With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?
Ransomware: To Pay or Not to Pay?
Ransomware is an increasingly prevalent threat to small and medium-size business, but when is it right to pay a ransom?
Zero Days and Patch Lag: Stemming the Software Pandemic
Chrome has become the increasing subject of Zero Day Exploits owing to the unavoidable problem of patch lag
The Story of the EC-Council Gender Survey Scandal: Survey Creator Says "It Was Written by Women so it Can't be Sexist"
On Friday 09 April, EC-Council pushed out a ‘women in security’ survey poll on LinkedIn with three abhorrently sexist answer options. Eleanor Dallaway investigates…
How Security Culture Invokes Secure Behavior
Orgs should take steps to improve their security culture now
How SASE is Key to 5G Security Success
With the SASE model, orgs will have the opportunity to offer more secure 5G networks
Questions Enterprises Should Be Asking as they Migrate to the Cloud
What steps should orgs take to ensure a secure move to the cloud?
Risk Management Program Development 101
What are the steps orgs need to take to develop a successful risk management program?
Blurring Boundaries: Keeping ‘Consumer’ Scams Out of the Business Environment
Every business should act now to safeguard themselves and mitigate the impact of an attack
Who Should Own Third Party Risk Management?
TPRM’s role in keeping orgs safe from cyber-attacks creates differing opinions on where it should reside
#COVID19, Password Spraying and the NHS
How password spraying risks threatens the NHS
Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis
Organizations need to ensure their awareness programs are relevant and targeted