Infosecurity Opinions

Slow and Steady Wins the Race to the Cloud
Rushing through cloud migration will leave organizations more vulnerable to security breaches

Charting a Path Out of an Epidemic of Hidden Breaches
The cyber industry needs to get better at detecting and preventing hidden breaches

Considerations When Sharing Information with an AG's Office
What are the risks associated with producing info to a state AG?

Why Businesses Must Diversify Their Tech
In light of the widespread website outage last months, should organizations look to diversify their tech providers?

#HowTo: Approach Budgeting as a CISO
CISOs need to assess how security can contribute to business objectives to manage their budgets

The Countdown Towards Zero Trust and MFA
What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

The Evolution of Ransomware and How to Move Forward
Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

Staying On Guard Against Cyber-Attacks
Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

Understanding and Mitigating Cyber Risk in the Healthcare System
Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

#HowTo: Be More Resilient Against Ransomware
Organizations need to start designing their disaster recovery plans with ransomware in mind

Malware-as-a-Service is a Booming Business
Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

The Power of Anonymity in Supply Chain Security
The rise in supply chain attacks should serve as a warning to organizations to update their email security

Going Passwordless: What Are the Benefits For Your Business?
Given the number of breaches associated with stolen credentials, should orgs go passwordless?

How DNS Security Can Help Combat the IoT Challenge
Domain name system (DNS) can help IT teams protect their network against shadow IT threats

Three Key Elements of a Defense-in-Depth Approach to Phishing
What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

#HowTo: Protect Medical Institutions from Cyber-Attacks
Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

How Ransomware is Teaming Up with DDoS
Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

Data Sovereignty and Privacy Compliance Post Schrems II
How can organizations remain compliant following the Schrems II decision last year?

Why Enterprise Users Can't Wait for Patch Updates
Are software patches often little more than a glorified form of Whack-A-Mole?

How Has the Education Sector Adapted to Life in the Cloud?
Education institutions have faced particular challenges with cloud adoption during COVID-19

























