Infosecurity Opinions

#HowTo: Demystify the NIST Cybersecurity Framework

#HowTo: Demystify the NIST Cybersecurity Framework

The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines

How to Keep Your CMS Safe and Secure

How to Keep Your CMS Safe and Secure

Unless properly secured, a CMS can open the door to bad operators

Only More Secure Coding Can Protect the Software Supply Chain

Only More Secure Coding Can Protect the Software Supply Chain

How developers can build more secure coding and increase industry awareness of the issue

California's Child Privacy Protections Could Be Thorn in Stalkerware's Side

California's Child Privacy Protections Could Be Thorn in Stalkerware's Side

California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat

Why the Password Is Not Dead

Why the Password Is Not Dead

Why passwords are here to stay as the core of personal digital security

European Commission Acknowledges the Evolving Threat Landscape

European Commission Acknowledges the Evolving Threat Landscape

Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more

#HowTo: Build Awareness and Best Practices into Your Company and Development Culture

#HowTo: Build Awareness and Best Practices into Your Company and Development Culture

How can organizations change security from a defensive tax model to an offensive mode?

Protecting the Three Dimensions of the Data Lifecycle

Protecting the Three Dimensions of the Data Lifecycle

To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle

Solving the Gen-N Security Dilemma

Solving the Gen-N Security Dilemma

The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks

#HowTo: Eradicate Plaintext Data Breaches

#HowTo: Eradicate Plaintext Data Breaches

Organizations that encrypt everything can protect sensitive information even in the event of a data leak

#HowTo: Protect Your Organization From the Increasing Threat of Ransomware

#HowTo: Protect Your Organization From the Increasing Threat of Ransomware

Organizations need to implement stronger cyber-defenses to tackle threat of ransomware

Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools

Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools

Organizations need to find a way to capture the real value of their tools and metrics

What’s Hot on Infosecurity Magazine?