Infosecurity Opinions

Can You Identify and Defend Your Organization’s Crown Jewels?

Can You Identify and Defend Your Organization’s Crown Jewels?

You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

Slow and Steady Wins the Race to the Cloud

Slow and Steady Wins the Race to the Cloud

Rushing through cloud migration will leave organizations more vulnerable to security breaches

Charting a Path Out of an Epidemic of Hidden Breaches

Charting a Path Out of an Epidemic of Hidden Breaches

The cyber industry needs to get better at detecting and preventing hidden breaches

Considerations When Sharing Information with an AG's Office

Considerations When Sharing Information with an AG's Office

What are the risks associated with producing info to a state AG?

Why Businesses Must Diversify Their Tech

Why Businesses Must Diversify Their Tech

In light of the widespread website outage last months, should organizations look to diversify their tech providers?

#HowTo: Approach Budgeting as a CISO

#HowTo: Approach Budgeting as a CISO

CISOs need to assess how security can contribute to business objectives to manage their budgets

The Countdown Towards Zero Trust and MFA

The Countdown Towards Zero Trust and MFA

What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

The Evolution of Ransomware and How to Move Forward

The Evolution of Ransomware and How to Move Forward

Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

Staying On Guard Against Cyber-Attacks

Staying On Guard Against Cyber-Attacks

Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

Understanding and Mitigating Cyber Risk in the Healthcare System

Understanding and Mitigating Cyber Risk in the Healthcare System

Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

#HowTo: Be More Resilient Against Ransomware

#HowTo: Be More Resilient Against Ransomware

Organizations need to start designing their disaster recovery plans with ransomware in mind

Malware-as-a-Service is a Booming Business

Malware-as-a-Service is a Booming Business

Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

What’s Hot on Infosecurity Magazine?