Infosecurity Opinions

Data-Centric Security: Protecting What Really Matters

Data-Centric Security: Protecting What Really Matters

Data-centric, rather than network-centric, security strategies are becoming the norm in our new digital environment.

Why 2017's Phishing Attacks Teach Us All to Beware

Why 2017's Phishing Attacks Teach Us All to Beware

If these attacks tell us one thing, it’s this: don’t be fooled into thinking attacks only happen to others.

How Can Data Forensics Help The Fight Against Malware?

How Can Data Forensics Help The Fight Against Malware?

IT teams need better intelligence, that insight can come from remediation in the form of network forensics.

Changing Cyber Threats Call For New Protection Strategies

Changing Cyber Threats Call For New Protection Strategies

Changes in cybercrime techniques mean that companies need to be sure their strategies—from security practices to cyber insurance coverage—keep pace.

You Wouldn't Re-Use a Needle, So Why Re-Use a Computer?

You Wouldn't Re-Use a Needle, So Why Re-Use a Computer?

We visit websites, open email attachments, download documents, and plug in USB devices – all on the same device – seemingly oblivious to the potential threat of infection without even washing our virtual hands.

Smart Buildings Require Full-Stack Cybersecurity

Smart Buildings Require Full-Stack Cybersecurity

Smart buildings combine operational technology (OT), information technology (IT) and IoT devices.

How The Access Control Dilemma is Losing Sales

How The Access Control Dilemma is Losing Sales

Do the PCI-DSS standards address every single technical consideration in keeping financial data safe?

Four Things Businesses Should be Doing to Protect from Cyber-Attacks

Four Things Businesses Should be Doing to Protect from Cyber-Attacks

There are a host of basic best practices that a majority of corporate networks are failing to implement, and it’s leaving them critically vulnerable.

How to Keep Pace With the Shifting Sands of Cybersecurity

How to Keep Pace With the Shifting Sands of Cybersecurity

Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore.

Putting The Brakes on Cyber-Attacks for IoT and Connected Cars

Putting The Brakes on Cyber-Attacks for IoT and Connected Cars

The attack surface in this ecosystem is enormous and the increased connectivity and complexity is resulting in new risks and threats to personal safety, security and privacy.

Better Management of Bitlocker in Your Enterprise

Better Management of Bitlocker in Your Enterprise

How to better manage BitLocker and the key considerations when rolling it out.

Is Compliance-Only Vaccination Enough?

Is Compliance-Only Vaccination Enough?

Organizations who have adopted security measures - not just for auditor’s consent but genuinely for their businesses - will find themselves victorious.

What’s Hot on Infosecurity Magazine?