Infosecurity Opinions

Key Questions any CEO Should ask Before Moving to the Cloud

Key Questions any CEO Should ask Before Moving to the Cloud

As your organization makes the move to the cloud, managing security risks should be on the top of your list.

Fighting on Today's Front Lines

Fighting on Today's Front Lines

The overall impression is that data breaches are the result of enemy nation states, hacktivists, organized crime, and other evil forces,

Believe It: Cybersecurity is Getting Better, Not Worse

Believe It: Cybersecurity is Getting Better, Not Worse

We’ve become beholden to our own fear, uncertainty, doubt – which basically says that cybersecurity has never been worse.

To Mitigate Phishing Risk, Let Employees 'Fail Forward'

To Mitigate Phishing Risk, Let Employees 'Fail Forward'

Learning from mistakes is vital to a strong anti-phishing program.

'Zero Trust' Security Will Make A Comeback in 2018

'Zero Trust' Security Will Make A Comeback in 2018

Zero trust controls will allow careful scrutiny of how to raise cybersecurity defenses.

Is Your Social Media Strategy More Of A Cybersecurity Faux Pas?

Is Your Social Media Strategy More Of A Cybersecurity Faux Pas?

You can’t stop staff members using social media, but you can effectively train and continuously educate them about the hazards.

Is The NCSC Doing Enough to Protect us from Today's Cyber Threats?

Is The NCSC Doing Enough to Protect us from Today's Cyber Threats?

How successful has the NCSC been to date? What else can be done to safeguard the UK against a relentless cybersecurity onslaught?

The Most Important Part of Least Privilege Tactics

The Most Important Part of Least Privilege Tactics

If a cyber-criminal manages to get their hands on an employee’s legitimate but limited login credentials, their ability to do any damage is greatly reduced.

The Case of Disappearing Vulnerabilities

The Case of Disappearing Vulnerabilities

While the practice of identifying vulnerabilities is basically sound, the SaaS vendor cannot rely on public databases of vulnerabilities.

Solving the Human Problem: A Progressive Security Strategy to Phishing

Solving the Human Problem: A Progressive Security Strategy to Phishing

A realistic anti-phishing goal is not to focus on a click-through rate but to track the rate at which employees report phishing emails to their IT or security teams.

ICOs: No Credibility Without Better Security

ICOs: No Credibility Without Better Security

Without good protection, ICOs will continue to reside on the sidelines. With solid security, they could become a major player.

Inactive Accounts: The Key to Your Company's Sensitive Data

Inactive Accounts: The Key to Your Company's Sensitive Data

Most organizations focus on protecting current users, but ghost users are a huge and often overlooked threat.

What’s Hot on Infosecurity Magazine?