Infosecurity Opinions

From Zero Day Attack to Zero Day Recovery

From Zero Day Attack to Zero Day Recovery

With Zero Day Recovery, data can be recovered quickly, minimizing or even eliminating the damage that a destructive cyber-attack would have caused the business.

Advanced Persistent Agony: Fixing the Broken Data Breach Response Template

Advanced Persistent Agony: Fixing the Broken Data Breach Response Template

The standard response playbook to a major data breach is harmful to security professionals.

How to Balance Security with Digital Transformation

How to Balance Security with Digital Transformation

IT security professionals are struggling to keep up with the technologies that drive digital transformation.

Overcoming the Siloed Network Security Challenge

Overcoming the Siloed Network Security Challenge

Unlike IT teams, cyber-criminals aren’t constrained by lines of business, siloed technology teams, or carefully guarded network domains.

The New Age of Accountability

The New Age of Accountability

Accountability refers to an obligation on individuals and businesses to be held responsible for their data protection actions and activities, and to accept liability for data breaches.

Security AI is more than an Algorithm

Security AI is more than an Algorithm

All analytics will be more effective when provided with rich, high-fidelity sources of data.

Is Sandboxing a Playground for Browser-Borne Threats?

Is Sandboxing a Playground for Browser-Borne Threats?

Given today’s evasive threats, will sandboxing be considered an adequate form of security for much longer?

Phishing in the Deep End: The Growing Threat of Attacks Beyond Email

Phishing in the Deep End: The Growing Threat of Attacks Beyond Email

The primary target has now become the unsuspecting person using these devices and systems.

Mitigating IoT Cyber Risks: Training is the First Step

Mitigating IoT Cyber Risks: Training is the First Step

Roles which five years ago we would never have thought of as requiring cybersecurity training, will need it as adoption of connected devices continues to rise.

It Started with a Phish

It Started with a Phish

The four key elements of an anti-phishing program.

Are Bug Bounty Programs the Answer to Secure Endpoints?

Are Bug Bounty Programs the Answer to Secure Endpoints?

Like with any security protection, don’t just rely on one form – bug bounties aren’t a silver bullet.

Shrouding IoT Security in the Fog

Shrouding IoT Security in the Fog

By virtue of its distributed architecture, fog computing secures everything from the cloud to the device.

What’s Hot on Infosecurity Magazine?