Infosecurity Opinions

How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This
SMEs need to take a new approach to protecting themselves from cyber-attacks

CSP & Magecart Web Skimmers: Facts and Fiction
It is important for e-commerce providers to fully understand the evolution of Magecart attacks

How Secure Are Healthcare IT Systems? New Research Provides a Glimpse
How can healthcare orgs make themselves more secure amid rising attacks?

The Case For and Against Criminalizing Ransomware
What are the main issues surrounding ransomware payments?

Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots
Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process

HowTo: Improve Your Security Team’s Remediation Efficiency
What are the key steps to developing a risk-based vulnerability management strategy?

Encrypted Data in the Cloud
Encryption will be vital in preventing data breaches in the cloud

Understanding Education and Certifications to Help Find Your Path in Cybersecurity
There's a need for clarity on options for career pathways for those wanting to enter the cybersecurity industry

Tax Season is in Full Swing and so is Unemployment Fraud
With the tax season in full swing, protecting against financial fraud is vital

Vital Signs: Why Service Monitoring is a Key Step in Effective IoT Cybersecurity
Should we consider service monitoring as the foundation to IoT security?

Promoting a Cultural Shift for Cybersecurity
Developing a good security culture will reduce the risk of scams

#HowTo: Stop Hackers Targeting Your Home
How can organizations defend their remote workforce from hackers?

It’s Time to Captivate the Next Generation of Cybersecurity Professionals
With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses

Firewall and Malware Challenges for Virtualized Telecom Networks
How can service providers defend against attacks targeting virtualized telecom networks

Remote Working: The New Security Perimeter
Do orgs need to rethink their security frameworks to adapt to a remote model?

Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder
How have ransomware attacks evolved over the past year?

#HowTo: Implement Zero-Trust into IoT Security
How can orgs ensure the surge in IoT devices used by employees is secure?

Cybersecurity State Power Struggles
Security focus must shift from stopping malicious access to protecting data itself

Transforming Security Strategies in Times of Uncertainty
The pandemic will not be the last disruption to security planning

Communication is Crucial in the Fight Against Phishing Scams
What communication strategies should orgs employ to mitigate against the risk of phishing scams?























