Infosecurity Opinions

Phishing Reports Show You There's a Problem, but What's Next?
Why investing in fun and engaging training for your team will pay dividends

Three Critical Cybersecurity Metrics to Fight Back
How CISOs can fix security weaknesses to stop and mitigate attacks effectively

#HowTo: Counter Common E-commerce Threats
As e-commerce continues to grow, online retailers are more susceptible to outside threats

The True Cost of DDoS Attacks
The cost of DDoS attacks is on the rise, and only an active defense will counter their potentially crippling impact

What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?
The practical uses of AI to address the skills shortage in cybersecurity

Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks
Training improves the cyber resilience of employees and reduces the likelihood of an organization suffering a breach

Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce
Follow these zero trust best practices to secure data and assets

Analyzing the Twitch Hack and a Potential Security Hole Around IRC
The attack seems to be the work of an individual attacker intent on disrupting the company

Schools Prove Easy Targets For Hackers
Schools have significant revenues, a general lack of cyber security and a low perception of information security

Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection
With threat actors circling, there’s an urgent need to start these efforts now

#HowTo: Avoid Credential Abuse
Cloud-based MFA can enhance organizations' security

Developers and Security - Using Data to Consolidate and Collaborate
Looking at data in context can help teams improve their results, consolidate their tooling and collaborate more effectively

Latest OMB Memo Doubles Down on Flawed NIST Critical Software Standards
The administration must re-examine NIST’s new standards and seize the opportunity to make a real difference

In this Perpetual Distributed Workplace, How Do We Trust Each Other?
The inability to trust becomes a cyclical challenge that could stifle employee productivity and corporate innovation for years

Why the M&A Boom of 2021 Could Be a Data Security Bust
Addressing data dangers as soon as possible should be a fundamental part of the M&A process

What California, Colorado and Virginia Teach Us About the Future of US Privacy Law
Key trends that will influence other states

Protecting Critical Infrastructure in the Digital Battlefield
Security and safety must be inherent and assured characteristics for all intelligent systems throughout their lifecycle

#HowTo: Defend Against Rising Application Layer Attacks
Advances in applications have introduced a number of new often overlooked, security vulnerabilities

Make Employees Part of the Security Solution
Organizations should build employee training within overall security solutions

Reducing Cookie Walls and Banners Post-Brexit: There Must Be a Better Way
Are proposed legislative changes in regard to cookies really necessary?























