Infosecurity Blogs

COVID-19 and Cybersecurity Staffing Shortages
Why staffing shortages are getting worse and how to address the issue

Time to Pardon Edward Snowden?
Edward Snowden, in the end, did the right thing by notifying the public of illegal privacy violations, and it’s time he came home

Three Reasons Why Password Self-Service Enrollment Fails, and What to Do About it!
Password self-service enrollment needs to be a process that is intuitive, simple and non-invasive

Repairing SQL Database Corruption with CHECKDB Repair? You Can Lose Your Data Forever
An enterprise database repair tool can plug gaps in your SQL database maintenance and restoration strategy

Credential Stuffing: the Culprit of Recent Attacks
Credential stuffing attacks use stolen usernames and password combinations

IR Planning – It Is Not Optional!
Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response

Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems
Ransomware attacks are adopting an approach defined as “double extortion"

Cyberwarfare: the New Frontier of Wars Between Countries
Cyberwarfare can be launched instantly, making it difficult to counter

A New Path for Data Protection
Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding

Using Self-Service Password Reset Tools to Support Remote Workers
Password resets have always been problematic for helpdesks

Focus on Continuous Learning, Not Passing Exams
Continuous learning is done by teaching humans to think for themselves and be creative

Stop the Cyber-Attack Cycle with Privileged Access Management
Securing privileged access helps shrink the attack surface

Is the Security Department a Barrier for Progression or are they Misunderstood?
Is the security team, "The Department of No?"

Distributed Working Demands New Levels of Data Security at the Edge
Lockdowns and quarantines have rapidly changed how organisations of all sizes operate

Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices
The critical considerations for migrating an on-premises email organization to Office 365

Is it Finally the End of Adobe Flash Player?
With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?

Twitter Hack Exposes Security Holes
Lessons learned form the recent Twitter breach

Rethinking Security: The Merging of Personal and Professional
Steps organizations can take to reduce the security vulnerabilities of distributed workforces

How AI is Becoming Essential to Cyber-Strategy
Artificial neural networks can allow an AI to self-determine what features it uses to reach a conclusion

The Russia Report: A Need for Large-Scale National Protective Interventions
The findings of the ISC’s Russia Report will instigate new investigations and lines of inquiry about government security globally.




















