Infosecurity Opinions

#HowTo: Protect COVID-19 Data from Breaches and Theft
Fighting COVID-19 meant gathering, storing and organizing a huge volume of data, increasing the risk of breaches

What Telcos Should Learn from the Optus Breach
Telcos must be aware of their API security risks following the recent Optus breach

Meaningful Learnings from the Uber Breach
What lessons should cybersecurity professionals take from the recent Uber breach?

#HowTo: Keep Universities Secure in Today’s Cyber Threat Environment
With universities welcoming a new student intake this month, they must be prepared to face a deluge of cyber-attacks

#HowTo: Defend the Legal Sector from Insider Threats
Figures show that the real cyber-threat to legal firms lies close to home

Cybersecurity Vulnerabilities: The Race to Patch
Organizations should question whether they have the resources to continuously monitor and triage third-party cyber risk

Five Myths About Cybercrime and Cybersecurity
It is essential to bust common myths about cybercrime

#HowTo: Enhance Data Security and Privacy
Prevention strategies and strong incident response plans will enable resilience and reduce the overall business impact of a breach

#HowTo: Prove Identity Security ROI to Boards as a CISO
CISOs must learn how to persuade the board to invest in cybersecurity

How Geopolitical Tension Creates Opportunities for Cyber-Criminals
DDoS attacks are increasingly being incorporated into the arsenal for geopolitical protests and warfare

#HowTo: Secure Your Kubernetes Environments
Kubernetes security needs to extend well beyond pre-deployment to encompass the environment in runtime

#HowTo: Approach IoMT Security and Risk Management
Healthcare security teams face unique challenges in protecting IoT devices

Are We Doing Enough to Protect Our NHS?
Five years on from the WannaCry ransomware attack that hit the UK's NHS, is the organization's cybersecurity posture sufficient?

#HowTo: Find the Right SOC Provider
Organizations need to find a partner who goes beyond the typical managed SOC commercial relationship

UX Design is Key to Creating Privacy Controls that Unlock Value
It’s vital to provide clear journeys for customers to choose how their data is used

#HowTo: Stay Cyber-Secure This Summer
Chris Harris offers safe practices holiday-goers should follow this summer

#HowTo: Overcome Burnout in Cybersecurity Teams
Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk

The Needle is Shifting on Post-Quantum Security – Here’s What You Need to Know
Businesses now have the tools they need to begin thinking about migrating to new post-quantum standards

HowTo: Level Up MSPs’ Cybersecurity
MSPs that monitor, deploy and respond will be a step ahead of their competitors

Is There a Weak Link in Your Supply Chain?
The supply chain is only secure when all entities carry out effective, coordinated security measures


























