Infosecurity Opinions

How Long Before VPNs Are Mothballed?
Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core

The Top 5 Cybersecurity Tools Companies Need to Implement Right Now
The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked

DDoS Attacks Against Online Gamers and the Damaging Ripple Effect
Why vulnerable and critical industries must further invest in cybersecurity

QR Security - Are You Ready?
What are the security concerns surrounding QR codes, and how can these be mitigated?

Cybersecurity for the Post-COVID Era
IT teams need to rethink their cybersecurity strategies for the better

#HowTo: Measure the Performance of Your Cyber Team
Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent

How to Build and Retain Your Cybersecurity A-Team
With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever

Cyber-Attacks: Risk Transference as Crucial as Risk Prevention
How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks

How Businesses Can Stay Ahead of the Christmas Rush
How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers

How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI
We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern

4 Reasons Why Christmas Is Peak Season for Cyber-Attacks
Four reasons why and what you can do to protect yourself

AI-Powered Malware Doesn't Actually Exist
Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

Cyber Resiliency: Safeguarding Data for Business Continuity
The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing
While innovations are intended for good, hackers lie in wait to capitalize on them

CBD: Stress Reliever to Stress-Inducing Phishing Scam
It only takes one careless click for hackers to gain access to a network

Insider Threats: Protecting from Within
Why access, data and awareness are key to minimizing malicious insider threat risk

#HowTo: Improve Security Awareness Training
Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

Cybersecurity Risks Around Smart City Development
Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

Will Single Sign-on Ever Become Mainstream?
For SSO to be mainstream, it's vital to maintain control of identities and user access levels

The Long and Short Roads to Security Maturity
Why less mature organizations have a long and hazardous road to travel























