Infosecurity Opinions

Smart City Development Is Pushing Video Surveillance to the Cloud
Shifting surveillance to the cloud requires increased access to crucial real-time data

#HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security
It usually takes less than 10 minutes to score a company’s security based on their public information

GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors
Several tips for SaaS companies to navigate the updated regulations

Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind
Three identity security practices that are fundamental to the success of a zero trust strategy

Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected
Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection

Stop Purchasing, Start Developing: Why Hiring for Tech in 2022 Will Look Very Different
Why cyber reskilling and upskilling are key to keeping organizations safe

Defense Against the Dark Arts: Learnings From the Magical World to Boost Your AppSec
How businesses can guard against the threat actors who are cursing, jinxing and charming their way past security defenses

Why Politically Motivated Cyber-Attacks Are a Threat to Democracy
Why governments and political parties must work harder to better understand and safeguard their assets

#HowTo: Automate Your Security Processes
To make the most of automation, it’s important to adopt a holistic approach to your processes and people

Protecting Supply Chains from Highly Contagious Attacks
Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction

Why Holistic Ecosystems Will Be Central to Future Cybersecurity
Businesses require an approach comprising both technological and human components

The Colonial Pipeline Attack Eight Months On
Why asset operators need to begin shaping their security programs to protect their most critical assets

Cybersecurity Trends for 2022
Cybersecurity needs to remain at the front of mind in 2022 as companies look to build on the measures they put in place in 2021

Protecting the Most Crucial Software Supply Chain Targets
How today’s attackers take advantage of software supply chain weaknesses

#HowTo: Solve Your Organization’s Password Woes
CISOs must perform a careful balancing act – protecting their organization’s systems while not overly inconveniencing or disrupting employees

How Long Before VPNs Are Mothballed?
Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core

The Top 5 Cybersecurity Tools Companies Need to Implement Right Now
The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked

DDoS Attacks Against Online Gamers and the Damaging Ripple Effect
Why vulnerable and critical industries must further invest in cybersecurity

QR Security - Are You Ready?
What are the security concerns surrounding QR codes, and how can these be mitigated?

Cybersecurity for the Post-COVID Era
IT teams need to rethink their cybersecurity strategies for the better
























