Infosecurity Opinions

Three Questions to Consider to Help Mitigate Against Supply Chain Attacks
How should orgs assess current approaches to mitigate against supply chain attacks?

Taxed and Hacked: How Your Company Could Be at Risk This Tax Season
What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?

Outlier Detection Techniques for Fraud
Data science techniques can help detect credit card fraud

What if we Gave Users Control of Their Own Digital Identity?
How can users be put back in control of their digital identities?

Personal Security IS Enterprise Security
Helping employees stay safe in their personal lives will translate into work

#HowTo: Protect Your Employees from Data Loss
How should orgs tackle insider risk amid the shift to remote working?

How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This
SMEs need to take a new approach to protecting themselves from cyber-attacks

CSP & Magecart Web Skimmers: Facts and Fiction
It is important for e-commerce providers to fully understand the evolution of Magecart attacks

How Secure Are Healthcare IT Systems? New Research Provides a Glimpse
How can healthcare orgs make themselves more secure amid rising attacks?

The Case For and Against Criminalizing Ransomware
What are the main issues surrounding ransomware payments?

Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots
Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process

HowTo: Improve Your Security Team’s Remediation Efficiency
What are the key steps to developing a risk-based vulnerability management strategy?

Encrypted Data in the Cloud
Encryption will be vital in preventing data breaches in the cloud

Understanding Education and Certifications to Help Find Your Path in Cybersecurity
There's a need for clarity on options for career pathways for those wanting to enter the cybersecurity industry

Tax Season is in Full Swing and so is Unemployment Fraud
With the tax season in full swing, protecting against financial fraud is vital

Vital Signs: Why Service Monitoring is a Key Step in Effective IoT Cybersecurity
Should we consider service monitoring as the foundation to IoT security?

Promoting a Cultural Shift for Cybersecurity
Developing a good security culture will reduce the risk of scams

#HowTo: Stop Hackers Targeting Your Home
How can organizations defend their remote workforce from hackers?

It’s Time to Captivate the Next Generation of Cybersecurity Professionals
With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses

Firewall and Malware Challenges for Virtualized Telecom Networks
How can service providers defend against attacks targeting virtualized telecom networks
























