Infosecurity Opinions

2018 Faces New Threats, But Same old Problems

2018 Faces New Threats, But Same old Problems

Every year brings a new set of cyber-threats but threats of 2017, 2016 and beyond are still with us.

Could Your Company Become a Cryptojacking Victim?

Could Your Company Become a Cryptojacking Victim?

Attackers find it cheaper to mine cryptocurrency by infiltrating and accessing someone else’s CPU or GPU power than pay for it themselves.

It Is Time for the CISO to be at the Table

It Is Time for the CISO to be at the Table

A CISO in the boardroom is still an odd occurrence, so does the CISO need to change the way they think and interact with the business?

Building a Successful Data-Centric Audit and Compliance Program

Building a Successful Data-Centric Audit and Compliance Program

A successful implementation of DCAP will eliminate the complexity and inefficiencies of today’s silo-based data security environments.

GDPR and the State of Employee Data Privacy

GDPR and the State of Employee Data Privacy

Rather than trying to fix each problem individually, ask what is the best way to truly control information?

Common IT Tools are the Hacker's Favorites

Common IT Tools are the Hacker's Favorites

Monitoring and analyzing common IT tools will make life harder for attackers.

How to do More With Less in Cybersecurity

How to do More With Less in Cybersecurity

Security teams are under-resourced and over-pressured, so how can they do more with less?

Klepto Currency: Are Hackers Cryptojacking Your Processing Power?

Klepto Currency: Are Hackers Cryptojacking Your Processing Power?

In the race to generate currency, “miners” are utilizing clever tools and techniques to gain access to computing resources

'Western' and 'Eastern' Approaches in DLP Solutions

'Western' and 'Eastern' Approaches in DLP Solutions

The differences between ‘western’ and ‘eastern’ approaches in the use of DLP solutions.

Accidental Insiders Pose a Serious Threat to Your Organization

Accidental Insiders Pose a Serious Threat to Your Organization

The unintentional insider threat can be equally risky to the organization and is unfortunately quite common.

Avoid These Security Mistakes During Cloud Migration

Avoid These Security Mistakes During Cloud Migration

How it is the “people” and “process” categories – that companies often miss during a cloud migration.

Working Smarter: Use Machine Learning to Merge IAM and SIEM

Working Smarter: Use Machine Learning to Merge IAM and SIEM

IAM and SIEM systems can give organizations the insight and clarity they so desperately need.

What’s Hot on Infosecurity Magazine?