Infosecurity Blogs

Why Wednesday Could be the Riskiest Day for Your Business
Are we placing too much pressure on people to act, and act perfectly, 100% of the time?

How to Fill the Cybersecurity Skills Gap
With cyber-attacks increasing in frequency and severity, we need to upskill existing IT and computer science professionals to meet demand

Security Engineers: Fighting Every Minute of Every Day
How security engineers successfully mitigate the world’s worst cyber-attacks

Security by Sector: ICS/OT Cybersecurity Risk is at Critical Level, Say Security Pros
More damning data regarding the cyber-risks surrounding industrial control systems and operational technology

No Substitute for Experience – Or CISOs’ Backgrounds
Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity

The Big Connect: How Data Science is Helping Cybersecurity
How data science is being used to protect our information

The Importance of a Cybersecurity Strategy for the Business
It is unfortunate that some companies still consider malware to be a minor threat

Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?
Is the appointment of a threat intelligence team enough?

The Changing Face of Cybersecurity: Protecting Consumers and SMEs
Small businesses leak information that criminals can freely obtain and abuse

Embracing Your Legacy: Protecting Legacy Systems in a Modern World
Legacy infrastructure is still a crucial part of enterprises across many industries

Security by Sector: Digital Transformation in the Healthcare System
The healthcare industry has traditionally struggled with information security

How Many Passwords Should be in a Password Blacklist?
The answer should be as many as possible, but current advice is conflicting

Should the UK Ban Huawei?
A ban on Huawei is actually the wrong approach

Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record
An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

The Rise of Account Takeover Fraud in the Media Industry
A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats
A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

Security: a Missing Ingredient in Many DevOps Implementations
The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

The Security Landscape is Constantly Evolving: Are You Ready?
The one certainty in the world of cybersecurity is that change is imminent

Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment
The need for micro-segmentation as a security solution is not new

Incident Response: Endgame
What incident response lessons can we learn from the latest Marvel episode?















