Infosecurity Blogs

Is the Security Department a Barrier for Progression or are they Misunderstood?
Is the security team, "The Department of No?"

Distributed Working Demands New Levels of Data Security at the Edge
Lockdowns and quarantines have rapidly changed how organisations of all sizes operate

Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices
The critical considerations for migrating an on-premises email organization to Office 365

Is it Finally the End of Adobe Flash Player?
With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?

Twitter Hack Exposes Security Holes
Lessons learned form the recent Twitter breach

Rethinking Security: The Merging of Personal and Professional
Steps organizations can take to reduce the security vulnerabilities of distributed workforces

How AI is Becoming Essential to Cyber-Strategy
Artificial neural networks can allow an AI to self-determine what features it uses to reach a conclusion

The Russia Report: A Need for Large-Scale National Protective Interventions
The findings of the ISC’s Russia Report will instigate new investigations and lines of inquiry about government security globally.

Dangerous Liaisons - Cloudphishing
The growing adoption (and exploitation) of cloud services requires a cloud-native security approach

Patching OpenSSL and GNU C Libraries Without Service Restarts
Organizations in all industries must ensure they are promptly mitigating vulnerabilities to prevent exploitation

Data Security and Third-Party IT Asset Disposition: A Paradox
The only truly secure method of IT asset disposition is in-house drive destruction

Building Cyber-Maturity Through Understanding Supply Chain Risks
A holistic approach, with proper management mechanisms in place, can increase cyber-maturity and reduce organizational risk

NIST Password Guidelines: What You Need to Know
Organizations’ best line of defense hinges on the ability to ensure security at the password layer

Using Trademarks to Combat COVID-19 Related Phishing
Straightforward domain name procedures can provide efficient relief against fraudulent websites and email.

Managing the Cybersecurity Threat Landscape with a Standard Approach
Certification against ISO 27001 shows that an organization takes information security seriously

The Challenge of Third-Party Compliance Management
As the regulatory landscape becomes more complex, many organizations lack resources to conduct a complete compliance program

Your Employees Are Reusing Passwords – Find Out How Many
Do you know your employees’ personal passwords? Well, you actually might!

Busting the Top Myths About Privileged Access Management
PAM solutions are a critical layer of defense

Exposed Code in Contact Tracing Apps: Copycats and Worse
Attack scenarios share a common characteristic: the ability to tamper with the integrity of contact tracing apps.

Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen
In light of the COVID-19 pandemic, a new challenge is beginning to arise – the need to change or reset passwords remotely




















