Infosecurity Opinions

Identity Theft Will Get Worse

Identity Theft Will Get Worse

Why organizations need to enhance their approach to identity verification

#DataPrivacyWeek: The Best Kept Secrets About Data Privacy

#DataPrivacyWeek: The Best Kept Secrets About Data Privacy

Why innovation in data privacy can improve value for businesses and consumers alike

#HowTo: Evaluate Your Cyber Insurance

#HowTo: Evaluate Your Cyber Insurance

Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention

The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

This new democratization of hacking tools means that no business is safe

Tackling Misconceptions of Mobile-Based Authentication

Tackling Misconceptions of Mobile-Based Authentication

The importance of the security and ease-of-use credentials of mobile-based one-time passcodes

Why Zero Trust is the Best Defence for our Digital Food Supply Chain

Why Zero Trust is the Best Defence for our Digital Food Supply Chain

A zero trust, best-practice approach is key to protecting critical food supply infrastructure

The Future of Cloud-Native in a Brave New World

The Future of Cloud-Native in a Brave New World

How IT teams can utilize the full benefits of cloud-native while significantly lowering the risk

Smart City Development Is Pushing Video Surveillance to the Cloud

Smart City Development Is Pushing Video Surveillance to the Cloud

Shifting surveillance to the cloud requires increased access to crucial real-time data

#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

It usually takes less than 10 minutes to score a company’s security based on their public information

GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors

GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors

Several tips for SaaS companies to navigate the updated regulations

Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

Three identity security practices that are fundamental to the success of a zero trust strategy

Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected

Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected

Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection

What’s Hot on Infosecurity Magazine?