Infosecurity Opinions

#HowTo Reduce Your Ransomware Attack Surface

#HowTo Reduce Your Ransomware Attack Surface

How can your organization significantly improve its chances at surviving a potential ransomware attack?

Working from Home Policies and the Future of Cybersecurity

Working from Home Policies and the Future of Cybersecurity

The COVID-19 epidemic has re-enforced that the future of cybersecurity is in the cloud

A Cybersecurity Culture Score

A Cybersecurity Culture Score

Looking at the Business Model for Information Security, a way of thinking about information security in a holistic way.

The Future for Network Security: What Does SASE Bring to the Table?

The Future for Network Security: What Does SASE Bring to the Table?

As part of an overall digital business transformation, organizations will look to SASE

Keeping Data Secure in the Always-On World

Keeping Data Secure in the Always-On World

Despite the proliferation of sophisticated cyber breaches, always-on availability is a consideration many IT leaders are not prioritizing

Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough

Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough

The most frustrating part of Wawa’s story? That it could’ve been prevented

A First-Class Feature: Security in the Era of Worker Data

A First-Class Feature: Security in the Era of Worker Data

As industries adopt data-rich wearable technologies, it’s imperative that security be prioritized as a first-class feature.

Push Security to the Edge: Overcoming Edge Computing Challenges

Push Security to the Edge: Overcoming Edge Computing Challenges

The best attacks are the ones you never see coming

Time to Stop Overlooking DNS Security

Time to Stop Overlooking DNS Security

For the internet to be secure, DNSSEC should be widely deployed

Why SSL Encryption Will not Become a Victim of its Own Success

Why SSL Encryption Will not Become a Victim of its Own Success

This level of security is an essential feature of online data exchange

Detecting Spear Phishing: Sophisticated Attacks Require a Sophisticated Defense

Detecting Spear Phishing: Sophisticated Attacks Require a Sophisticated Defense

Many email security approaches now rely on machine learning, in addition to heuristics.

#HowTo Be Sure You Choose a Safe and Secure Hosting Provider

#HowTo Be Sure You Choose a Safe and Secure Hosting Provider

Six data security questions to ask when review and choose your next hosting provider

What’s Hot on Infosecurity Magazine?