Infosecurity Opinions

DevOps and Security – What’s in a Name?

DevOps and Security – What’s in a Name?

By looking at a DevOps Security approach rather than DevSecOps, security teams can use their influence and experience to their advantage

Preparing Your Enterprise For a Post-Quantum Future

Preparing Your Enterprise For a Post-Quantum Future

There is no easy way to know if you are behind the curve, on schedule, or moving too slowly

Knowing Your Enemy: Attack Attribution in Cybersecurity

Knowing Your Enemy: Attack Attribution in Cybersecurity

While you can’t predict all attacks, you can use intelligence from the past to mitigate

Do We Need More Cyber Hygiene?

Do We Need More Cyber Hygiene?

Judging from the continued news of breaches, do we ever have enough cyber hygiene?

#HowTo Do SD-WAN Security

#HowTo Do SD-WAN Security

Arguably SD-WAN’s greatest benefit is identifying and closing holes in an enterprise’s security.

Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand

Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand

Brands are unaware of who fourth parties are, and damage control becomes more challenging

Is TikTok a Cybersecurity Threat?

Is TikTok a Cybersecurity Threat?

There are concerns about TikTok, so what can we do about them?

Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains

Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains

Attackers are increasingly looking to target people while they are travelling

Why Businesses Need to Re-Think Network Monitoring in 2020

Why Businesses Need to Re-Think Network Monitoring in 2020

The current approach to network security is significantly flawed on two counts

What Does the Hack Back Bill Mean to Your Business?

What Does the Hack Back Bill Mean to Your Business?

There is often vagueness in the language of new bills, especially when they are still in draft form.

What’s Hot on Infosecurity Magazine?