Infosecurity Opinions

The Countdown Towards Zero Trust and MFA
What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

The Evolution of Ransomware and How to Move Forward
Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

Staying On Guard Against Cyber-Attacks
Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

Understanding and Mitigating Cyber Risk in the Healthcare System
Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

#HowTo: Be More Resilient Against Ransomware
Organizations need to start designing their disaster recovery plans with ransomware in mind

Malware-as-a-Service is a Booming Business
Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

The Power of Anonymity in Supply Chain Security
The rise in supply chain attacks should serve as a warning to organizations to update their email security

Going Passwordless: What Are the Benefits For Your Business?
Given the number of breaches associated with stolen credentials, should orgs go passwordless?

How DNS Security Can Help Combat the IoT Challenge
Domain name system (DNS) can help IT teams protect their network against shadow IT threats

Three Key Elements of a Defense-in-Depth Approach to Phishing
What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

#HowTo: Protect Medical Institutions from Cyber-Attacks
Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

How Ransomware is Teaming Up with DDoS
Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

Data Sovereignty and Privacy Compliance Post Schrems II
How can organizations remain compliant following the Schrems II decision last year?

Why Enterprise Users Can't Wait for Patch Updates
Are software patches often little more than a glorified form of Whack-A-Mole?

How Has the Education Sector Adapted to Life in the Cloud?
Education institutions have faced particular challenges with cloud adoption during COVID-19

Signs, Causes and Solutions for Network Data Breaches
What are the common signs and solutions for dealing with network breaches?

#HowTo: Ensure Third Parties Don't Compromise Your Supply Chain
More disciplined attention is required to make sure third party vendors don't compromise your supply chain

Protecting CNI: It’s About the Collective
Nominet argues that protecting CNI requires a collaborative approach

Disengaged Employees Could Become Your Organization's Greatest Security Threat
Organizations must establish accountability for security to avoid the danger posed by disengaged employees

What Are GDPR's Hidden Benefits Three Years On?
What should organizations do to ensure they meet GDPR standards on data security and privacy?























