Infosecurity Blogs

Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record
An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

The Rise of Account Takeover Fraud in the Media Industry
A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats
A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

Security: a Missing Ingredient in Many DevOps Implementations
The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

The Security Landscape is Constantly Evolving: Are You Ready?
The one certainty in the world of cybersecurity is that change is imminent

Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment
The need for micro-segmentation as a security solution is not new

Incident Response: Endgame
What incident response lessons can we learn from the latest Marvel episode?

Understanding ICO Password Recommendations
Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data

Perspective Changes Everything: Shift Your Focus to the Edge
There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed

Survival of the Fittest: Take Security to the Edge
Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem

Password Requirements from NCSC & Cyber Essentials
Simplify passwords for users and put the burden on the authentication system

How Embracing Micro-Segmentation Helps You Master PCI Compliance
The art of mastering PCI DSS compliance is primarily about defining the scope of compliance

Keeping Innovation Flowing: What Makes a Successful Cyber Startup?
How can a cybersecurity startup succeed?

Is Effective Cybersecurity Expensive?
Whether effective cybersecurity really is very expensive

Are You Mature Enough to Secure Your Cloud to its Fullest Extent?
Every organization, whether it’s using on-prem, public cloud, or hybrid cloud architecture, needs a suitable security solution

Culture Carriers: Amplifying Your Security Awareness Message
How a culture carrier can benefit your company

How to be Secure in the Challenging Business Landscape
Data security applies in equal measure to start-ups, small- and medium-sized enterprises, and global consortia

There’s No Day Off for Cybersecurity Professionals
How can IT professionals continue to juggle multiple roles and tasks?

The Battle for Cybersecurity Talent Must Include Retention Emphasis
As companies compete over valuable cybersecurity professionals, retention becomes difficult

Password Managers - Popular and Safe
Password managers are safe to use, don't believe the hype
















