Infosecurity Opinions
#HowTo: Build The Right Skills to Become a CISO
To become a CISO, you need a wide range of skills
Investigate and Recover From Ransomware Attacks With Digital Forensics
How organizations can use digital forensics to assess damage, stop the spread and facilitate recovery
Defending Against Cyber-Threats – Think Like an Attacker
As UK businesses face increased risk of a cyber-attack, here are steps they need to take to lessen the threat
Why It's a Great Time to Be a Mobile Threat
As mobile devices become more important, hackers are seizing on a vulnerable blindspot in the enterprise attack surface
Securing Enterprise Data While Enabling Remote Working
How we can take measures to reduce our exposure to attacks and avoid being exploited
#IWD2022: Women in Cybersecurity: Why We Need to Inspire the Younger Generation
Is enough being done to close the gender gap and encourage women to join an industry?
A Critical Component of a Layered Approach to Cybersecurity: SIEMaaS
Embracing a layered approach to cybersecurity will give your organization an edge in the fight against cyber-threats
Cameras, Video Analytics and Legislation: Top Video Privacy Trends of 2022
Legislation worldwide needs to keep evolving while still allowing companies to innovate.
#HowTo: Prepare for the Future of Electronic Identities
Not everyone is prepared to take the leap and there is still some hesitancy around eID
Deep Learning: It's Not Too Good to Be True - It's Genuine Progress
When something seems too good to be true, it usually is, but not when it comes to deep learning
2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization
With a commitment to zero trust and supply chain reporting, public and private organizations will reduce the number of incidents
#HowTo: Solve the UK's Shortage of Cybersecurity Experts
What are the potential solutions to the UK's lack of cybersecurity professionals?
How to Build an Autonomic Security Operations Center (SOC)
A guide to transforming a SOC’s scale, visibility and automation
#HowTo: Introduce Advanced Technologies into Your Security Strategy
Advanced technologies are crucial to combatting modern cyber-threats, but how can they be integrated into your organization?
Criminal Cryptocurrency Transactions Will Drop by 30% by 2024 - Here's Why
Avivah Litan, VP research analyst at Gartner, outlines the four key developments why this drop will happen
Why Diversity Is Crucial to Bringing Cybersecurity Recruitment Into the 21st Century
How businesses should re-evaluate their hiring criteria, and how the current industry talent gaps can be navigated
Cyber-War Exclusion Clauses in Cyber Insurance
Why business leaders can no longer rely on insurers to bail them out when hit by ransomware
Why A Fundamental Change in Cybersecurity Is Required
As people’s lives become more linked to the digital realm, now is the time to move forward with digital safety
Quantum Encryption: The Basics
We’re on the verge of a state of 'quantum security' for everyone
#HowTo: Meet the Cyber Jobs Challenge
Technology solutions that leverage automation, context and the skills your team are key to addressing the cyber skills gap