Infosecurity Opinions

Working Smarter: Use Machine Learning to Merge IAM and SIEM

Working Smarter: Use Machine Learning to Merge IAM and SIEM

IAM and SIEM systems can give organizations the insight and clarity they so desperately need.

GDPR is Not a Ticking Timebomb for Huge Fines

GDPR is Not a Ticking Timebomb for Huge Fines

Organizations are being told that on the 25th May they will go into compliance meltdown: It’s all got a bit out of hand to be honest.

Why Cyber Insurance Works

Why Cyber Insurance Works

Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.

Building a Security Culture in the Age of GDPR

Building a Security Culture in the Age of GDPR

GDPR will present an opportunity to evolve from a systems-based approach to a data-driven one.

Most Businesses Overlook One Common Mainframe Security Vulnerability

Most Businesses Overlook One Common Mainframe Security Vulnerability

Most mainframe security products fail to address a crucial weakness: code-based vulnerabilities.

Spectre and Meltdown: Powerful Reminders of Side Channel Attacks

Spectre and Meltdown: Powerful Reminders of Side Channel Attacks

Many organizations had a recent experience with side channel attacks when security researchers announced the discovery of Meltdown and Spectre.

Does Ransomware-as-a-Service Enable More Cyber-Criminals?

Does Ransomware-as-a-Service Enable More Cyber-Criminals?

Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.

The Tesla Hack is a Serious Cryptojacking Warning

The Tesla Hack is a Serious Cryptojacking Warning

The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.

Cryptojacking: Back to the Future

Cryptojacking: Back to the Future

Cryptojacking is the perfect combination of two of the Internet's hottest trends - rampant hacking and the massive growth of cryptocurrencies.

Preventing the Next Ransomware Attack

Preventing the Next Ransomware Attack

While there is no simple solution to protect against ransomware attacks, there are a few key tactics that security teams can take that will boost their immunity.

Cryptocurrency Hacking Raises Threats of Financial Vulnerability

Cryptocurrency Hacking Raises Threats of Financial Vulnerability

A dependence on cryptocurrencies increases, we will see more and more social engineering attacks used to steal digital coinag

Why There is Still a Role for VDI in the Security World

Why There is Still a Role for VDI in the Security World

Despite the rush to move applications to the cloud, VDI’s security benefits mean it still has a place in today’s corporate networks.

What’s Hot on Infosecurity Magazine?