Infosecurity Opinions

In Case of Crisis: Third-Party Risk Across Three Dimensions
Do you have the visibility you need to be prepared?

How to Manage Patching in Infrastructure to Protect Against Cyber-Attacks?
Managing risks in critical systems and protecting against cyber-attacks

COVID-19, The Silent Hacker
It's time to put in place a system that empowers flexibility in working without driving support teams into ground

#HowTo: Protect Your Company From Magecart Attacks
As Magecart attacks surge amid increased e-commerce transactions, investing in web application security has never been more important

Redefining Ransomware – Why Confronting Cybercrime Starts With a War of Words
Ransomware has a clear definition and one that, in a world of growing digital complexity, matters

National Cybersecurity Strategies Are Under Pressure and Innovation Remains Key to Protection
How prioritizing the latest tech innovations will remain a key focus for many months to come

Are Protection Payments the Future of Ransomware?
Ransomware gangs are persistent, innovative and playing a long-term game – defenders must do the same!

#HowTo: Create a More Diverse Cybersecurity Team
Diversifying the talent pipeline will expand the talent pipeline and help build a healthier cybersecurity culture

The 'Silver Lining' to Ransomware Attacks on Businesses in an Increasingly Hostile World
The resilience gained from past attacks should be seen as a silver lining in the face of graver dangers

Know Your Ransomware Enemy: Getting Inside the Mind of a Hacker
Faced with the reality that it’s no longer a case of if, but when attackers strike, IT teams face a mission-critical task

5 Levers Lawmakers Can Use to Tackle Cybercrime
The ISF's cybersecurity framework allows policymakers, legislators and law enforcement agencies to better grasp the dynamics behind cybercrime

Supply Chain Attacks Are Increasing – Organizations Must Evolve
The old ways of protecting your most valuable assets aren’t working anymore, and it’s time to evolve

How Automated Offboarding Can Keep Your SaaS Stack Safe
Offboarding doesn't end when users have been disabled or removed from active directory or IAM

#HowTo: Effectively Manage and Secure APIs
API security needs to be seen as a critical dimension of a data security strategy

The Best Defense Is a Good Offense: How to Beat Ransomware
Why the conversation around ransomware needs to focus earlier on the attack chain

How to Begin Proactive Threat Hunting
The four key success factors of proactive threat hunting are VIMP – visibility, intelligence, machine learning and people

#HowTo: Get Cyber Essentials Certified
January 2022 saw significant changes to the Cyber Essentials certification, and organizations need to act to implement them

WFH - A Remote Prospect for Infosec Professionals?
Hybrid working seems set to become the norm but will security professionals be excluded given the nature of their role?

Ransomware Through the Supply Chain: Are Organizations Prepared for the New Normal?
Why it’s imperative organizations know where they fall in the supply chain to defend against attacks

Light at the End of the Ransomware Tunnel?
Insurance demands, state sanctions and reporting requirements will lead to the evolution of a new type of threat that only cyber resilience can meet.























