Infosecurity Opinions

How to Prevent Hackers From Hijacking Memorial Day

How to Prevent Hackers From Hijacking Memorial Day

How not to fall victim to a hoax on Memorial Day, and the solutions to solve this.

The ‘Secrets’ of Robust Encryption

The ‘Secrets’ of Robust Encryption

It is no longer good enough to rely on compliance to ensure a company has deployed enough security defenses

WannaCry Exposed Organizations' Weakest Link: How we Make it Stronger

WannaCry Exposed Organizations' Weakest Link: How we Make it Stronger

While the true scale of the WannaCry epidemic has yet to be revealed, the cybersecurity industry should already be learning from the incident, to make sure it’s never repeated.

How to Integrate Mobile Security into App Development

How to Integrate Mobile Security into App Development

While it’s recommended to benchmark your application for internal improvements, it is also very essential to perform security benchmarking against other programs

WannaCry: A Refreshing Attack

WannaCry: A Refreshing Attack

$300 is just enough to get attention and make a point without inflicting financial damage.

How Small Businesses Can Prepare For The Rise of Ransomware

How Small Businesses Can Prepare For The Rise of Ransomware

Small businesses are among the primary targets – perhaps even more than big businesses - of ransomware hackers.

One Week of WannaCry

One Week of WannaCry

What you need to know about the WannaCry ransomware attack.

AI: The Good, The Bad and The Ugly

AI: The Good, The Bad and The Ugly

AI’s massive processing power is far faster than the human brain in computational ability, and is progressing in conventionally “human” areas.

Dummies' Guide to WannaCry

Dummies' Guide to WannaCry

The WannaCry cyber-attack has gripped news headlines around the world.

Secure Remote Network Access Without Giving Away the Keys to the Castle

Secure Remote Network Access Without Giving Away the Keys to the Castle

How per-application access can help organizations to tighten security control over third-parties, without having to worry about how many different devices are trying to connect, and from where.

Using Employees as Breach Detectors

Using Employees as Breach Detectors

Training employees to reduce mistakes is a staple of every security program.

Lost in Translation? Managing Mixed Firewall Estates

Lost in Translation? Managing Mixed Firewall Estates

How organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks.

What’s Hot on Infosecurity Magazine?