Infosecurity Opinions

Building Privacy Into AI: Is the Future Federated?

Building Privacy Into AI: Is the Future Federated?

Machine learning requires data to be stored on a centralized server, resulting in a plethora of privacy implications

Phishing Reports Show You There's a Problem, but What's Next?

Phishing Reports Show You There's a Problem, but What's Next?

Why investing in fun and engaging training for your team will pay dividends

Three Critical Cybersecurity Metrics to Fight Back

Three Critical Cybersecurity Metrics to Fight Back

How CISOs can fix security weaknesses to stop and mitigate attacks effectively

#HowTo: Counter Common E-commerce Threats

#HowTo: Counter Common E-commerce Threats

As e-commerce continues to grow, online retailers are more susceptible to outside threats

The True Cost of DDoS Attacks

The True Cost of DDoS Attacks

The cost of DDoS attacks is on the rise, and only an active defense will counter their potentially crippling impact

What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

The practical uses of AI to address the skills shortage in cybersecurity

Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks

Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks

Training improves the cyber resilience of employees and reduces the likelihood of an organization suffering a breach

Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce

Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce

Follow these zero trust best practices to secure data and assets

Analyzing the Twitch Hack and a Potential Security Hole Around IRC

Analyzing the Twitch Hack and a Potential Security Hole Around IRC

The attack seems to be the work of an individual attacker intent on disrupting the company

Schools Prove Easy Targets For Hackers

Schools Prove Easy Targets For Hackers

Schools have significant revenues, a general lack of cyber security and a low perception of information security

Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection

Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection

With threat actors circling, there’s an urgent need to start these efforts now

#HowTo: Avoid Credential Abuse

#HowTo: Avoid Credential Abuse

Cloud-based MFA can enhance organizations' security

What’s Hot on Infosecurity Magazine?