Infosecurity Blogs

No Substitute for Experience – Or CISOs’ Backgrounds
Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity

The Big Connect: How Data Science is Helping Cybersecurity
How data science is being used to protect our information

The Importance of a Cybersecurity Strategy for the Business
It is unfortunate that some companies still consider malware to be a minor threat

Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?
Is the appointment of a threat intelligence team enough?

The Changing Face of Cybersecurity: Protecting Consumers and SMEs
Small businesses leak information that criminals can freely obtain and abuse

Embracing Your Legacy: Protecting Legacy Systems in a Modern World
Legacy infrastructure is still a crucial part of enterprises across many industries

Security by Sector: Digital Transformation in the Healthcare System
The healthcare industry has traditionally struggled with information security

How Many Passwords Should be in a Password Blacklist?
The answer should be as many as possible, but current advice is conflicting

Should the UK Ban Huawei?
A ban on Huawei is actually the wrong approach

Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record
An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

The Rise of Account Takeover Fraud in the Media Industry
A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats
A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

Security: a Missing Ingredient in Many DevOps Implementations
The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

The Security Landscape is Constantly Evolving: Are You Ready?
The one certainty in the world of cybersecurity is that change is imminent

Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment
The need for micro-segmentation as a security solution is not new

Incident Response: Endgame
What incident response lessons can we learn from the latest Marvel episode?

Understanding ICO Password Recommendations
Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data

Perspective Changes Everything: Shift Your Focus to the Edge
There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed

Survival of the Fittest: Take Security to the Edge
Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem

Password Requirements from NCSC & Cyber Essentials
Simplify passwords for users and put the burden on the authentication system














