Infosecurity Opinions

How Ground-Breaking is WhatsApp's Fine?
Every privacy policy needs careful thought and reflects the company’s actual data processing

How To Improve Patch Management
Why it's vital to creat a patching cycle that continuously updates your inventory, manages priorities and delivers updates

Hospital Security Teams: Are the Odds Stacked Against Them?
Hospital executives need to invest the resources necessary to ensure the safety of their patients

Cybersecurity 2021: Where Are We Moving Into Q4?
Why strong digital countermeasures, application allow-listing and endpoint encryption are gaining traction

Race Against Time: Why a Robust Application Security Posture is Essential
Application and security teams need to improve their synergy to protect organizations from data breaches

#HowTo: Make You and Your Departments More Digitally Secure
Organizations only need to do the simplest things to protect their data

Ransomware is Harming Cybersecurity Strategy: What Can Organizations Do?
Smarter use of technology can protect organizations from ransomware attacks

Why Are Industrial Control System Attacks Increasing?
The answer lies in the convergence of OT and IT, exposing industrial environments with outdated technologies to the internet

President Biden Has Opened the Door to Zero Trust - Will Boris Johnson Follow Suit?
Is it time for the UK government to endorse zero trust?

Avoiding the Achilles Heel of Non-European Cybersecurity
Should organizations choose a local provider in regard to their data security?

#HowTo: Secure Distributed Infrastructures
There are six areas critical to protecting distributed infrastructures

Securing the Network of the Future for Remote Work
As remote work surges, it is vital organizations enhance their network security

Rethinking Security When Identity is the Ultimate Attack Surface
The pandemic-induced accelerated digital transformation has seen new hybrid working models disrupting how identities are managed

Make or Break: What To Do When Security Solutions Fail
Why a strong business continuity strategy built around the concept of zero trust is essential

UK's General Data Protection Regulation (GDPR) Explained
Why there's a duty to protect the personal data of companies like Total Fitness under the UK's iteration of GDPR

GSaaS: The Changing Dynamics of Cybersecurity
GSaaS will shape the future of organizations' data security

Why AI and Automation Provide Superhuman Security
While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race

Cloud Misconfigurations: The Hidden but Preventable Threat to Cloud Data
Misconfigured cloud environments is an increasing security issue for businesses

Securing a Hybrid Work Environment: The Worst of Both Worlds
The new threat landscape and how organizations can prepare and protect themselves

The Three Pillars of Unified Risk Management for Product Security
In today's threat landscape, security requires a holistic approach involving both software and hardware aspects























