Infosecurity Opinions

Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

Security teams need to exercise an awareness of what methods are becoming newly popular among bad actors

Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity

Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity

Why compliance certifications prove that you uphold best industry practices

Using Threat Deception to Thwart Malicious Insiders

Using Threat Deception to Thwart Malicious Insiders

Like death and taxes, malicious insiders are a certainty of life

Stop Ignoring Two-Factor Authentication Just Because You’re Lazy

Stop Ignoring Two-Factor Authentication Just Because You’re Lazy

Laziness literally becomes the weakest point in their data protection systems

Improving Banking Experiences with Biometrics

Improving Banking Experiences with Biometrics

Using the correct biometrics will enable banks and financial institutions to enhance customer experiences

Data Exchange and Collaboration Can Bring Digital Forensics Down to Size

Data Exchange and Collaboration Can Bring Digital Forensics Down to Size

Focusing on data exchange and collaboration can go a long way toward making swift data collection

An Unfortunate Reality for Virtualized Systems

An Unfortunate Reality for Virtualized Systems

It is important that organizations recognize that virtualization and VMs are not flawless

A Concerning Proliferation of SIM-Swapping Fraud in Europe

A Concerning Proliferation of SIM-Swapping Fraud in Europe

SIM swapping requires substantial effort and costs from attackers, so high net worth individuals are targeted.

#HowTo Neutralize Wide-Area Network Cyber-Threats

#HowTo Neutralize Wide-Area Network Cyber-Threats

Proven measures to protect an enterprise WAN during a crisis and otherwise

Passwords Create More Vulnerabilities Than Ever

Passwords Create More Vulnerabilities Than Ever

As users suffer from password fatigue and default to password reuse, cyber-criminals are making it their mission to take advantage of this carelessness

Is GDPR Really a Two-Year Success Story?

Is GDPR Really a Two-Year Success Story?

To keep GDPR fit for purpose, a number of changes still need to be made and more clarity is needed

The Digital Generation Will Become the Cyber-Criminal’s Dream

The Digital Generation Will Become the Cyber-Criminal’s Dream

The first truly digital generation will bring different attitudes with them, including information sharing

What’s Hot on Infosecurity Magazine?