Infosecurity Opinions

Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder
How have ransomware attacks evolved over the past year?

#HowTo: Implement Zero-Trust into IoT Security
How can orgs ensure the surge in IoT devices used by employees is secure?

Cybersecurity State Power Struggles
Security focus must shift from stopping malicious access to protecting data itself

Transforming Security Strategies in Times of Uncertainty
The pandemic will not be the last disruption to security planning

Communication is Crucial in the Fight Against Phishing Scams
What communication strategies should orgs employ to mitigate against the risk of phishing scams?

Securing Critical National Infrastructure: The Top Four Obstacles to Overcome
Why is securing CNI such a challenge and how you can build your strategy for this effort?

The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay
What are the main tricks being pulled by cyber-criminals to lure victims?

#WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies
Orgs must develop proper backup and recovery strategies now

#WorldBackupDay: How to Protect the Last Line of Defense
How can orgs ensure their backups are safe?

Software-Defined Telecommunications and the Risk of DDoS
What will be the security risks associated with 5G telecoms and its associated architecture?

#HowTo: Use Marketing Principles to Gain Employee Buy-In and Results
Can marketing principles enhance security awareness training?

How Behavioral Biometrics is Combating Credential Stuffing Attacks
Can biometrics mitigate bad cybersecurity behaviors?

Was it a Breach or Credential Stuffing? The Difference Matters
It's important for victims to recognize the difference between breaches and credential stuffing attacks to respond appropriately

Re-engineering Cyber-Consciousness of the Human Element of Cybersecurity
How can orgs quantify the human element of cybersecurity?

#HowTo: Optimize Certificate Management to Identify and Control Risk
How should orgs approach certificate management in a distributed workforce?

Vaccine Misinformation Campaigns Are in Overdrive
How should organizations help staff detect misinformation campaigns?

Cloud Security Innovation in 2021: Key Trends
Substantial improvements in cloud security are expected this year and beyond

The Road to Autonomous Security
Does the automobile industry show the way forward for autonomous security?

#HowTo: Navigate Your Cyber-Posture as a Startup
How should startups go about implementing an initial security program?

Deciphering the Right Type of Encryption for Enterprise Cloud Compliance
What is the most appropriate type of data encryption for your organization?
























