Infosecurity Opinions
#HowTo: Improve Your Company’s Cybersecurity Training
With human error responsible for 95% of cybersecurity breaches, it's crucial that companies enhance their cyber training programs
5 Reasons Why Cyber Matters for CFOs
There is a growing imperative for CFOs and OCFO teams to increase their cyber acumen and work closer with CISOs
Over a Year of Log4j Lingering: Why We Need to Stop Viewing High-Severity Breaches as Anomalies
Steven Stone explains why we won't see the back of vulnerabilities like Log4j for some time
Why Cyber Mindfulness is the Future of Cybersecurity
Yvonne Eskenzi discusses how mindfulness can reduce the risk of stress and burnout in cybersecurity professionals
#HowTo: Create an Effective Red Team
Red teaming is now a common element of cybersecurity, but organization must ensure the teams they work with meet certain requirements
Regulations for SBOMs are Useless if You Cannot Take Action
SBOMs must be actionable and enforceable to have a significant impact in improving software security
QR Codes: A Growing Vulnerability to Cybercrimes
NCC's Rick Crandall discusses how cyber-criminals are leveraging QR codes to launch attacks and advice for consumers to avoid becoming victims
The Race Against Quantum: It’s Not Too Late to be the Tortoise that Beat the Hare
The race to defend against cyber threats brought on by quantum computing is on, and Jon France, CISO of (ISC)2, says the cyber industry must catch up
#HowTo: Fight the Use of Deepfakes in ID Theft
The ability to tell fake content from reality and how this applies to our online identities is a growing challenge amid the rise of deepfakes
#IWD2023: Learning Lessons to Boost Female Representation in Cybersecurity
Ahead of this year's International Women’s Day, Elizabeth Barr considers women’s status within cybersecurity
What the ADPPA Could Mean for Mid-Market Businesses and Startups
With the ADPPA legislation focusing on AI algorithms as well as data governance, it is vital businesses are prepared
The Cybersecurity Hype Cycle of ChatGPT and Synthetic Media
Many organizations will ultimately need a program to defend against this new class of threats
#HowTo: Accelerate Detection and Response in the Cloud
Enriching network traffic data can make SecOps analysts more effective
Should we Make Ransomware Payments Illegal?
With Australia contemplating a ban on ransomware payments, Will Dixon questions whether this will be a wise move
Why Organizations Should Not Rely on the New EU US Privacy Framework in the Long-Term
Roberts & Obradovic Law Group discuss the risks of relying on the new EU US Privacy Framework for data transfers
Cybersecurity Burnout – Human vs Machine
Current ways of working in cybersecurity have become outdated and unsustainable, creating a volatile operational cocktail
#HowTo: Update Software Securely
David Higgins from CyberArk highlights five best practices to follow when updating software as part of a wider defense-in-depth strategy
CISA’s Recognition of Security Control Validation is a Major Milestone
CISA recently issued an alert advising organizations to validate security control effectiveness
Will CMMC 2.0 Prove a Help or Hindrance to Defense Contractors?
The US federal government has created a simplified and more flexible version of the CMMC model, but will it have the desired impact in reality?
Why Keeping Your Gaming Console Secure Should be a Priority in 2023
With gaming cyber threats on the rise, Jasson Casey, sets out steps gamers can take to improve their online security