Infosecurity Opinions

The ABCs of TLAs: MDR, EDR and XDR
The cybersecurity industry needs to adopt consistent standards to avoid customer confusion

#DataPrivacyDay: New President, More Privacy
On Data Privacy Day, the tech landscape looks set to change dramatically – and for the better

#DataPrivacyDay: Are Your Employees Putting You at Risk?
Data privacy is more important than ever

#DataPrivacyDay: Three Trends Shaping Privacy in 2021
What will be the biggest developments in data privacy this year?

A CISO’s 2021 Cybersecurity Wishlist
What should CISOs' main priorities be for the coming year?

#HowTo: Avoid Being Breached
How organizations can ensure they are prepared to deal with modern cyber-threats

5G Technology: Driving the Cybersecurity Evolution
How organizations can leverage 5G technology to improve their cyber-resilience

Modernizing vs. Replatforming: Why Choosing the Right Approach Can Impact System Security
How can organizations keep their mainframe systems secure?

Rising Supply Chain Risk Requires Proactive Management
How organizations should prepare for the risk of supply chain attacks

2021’s Shift Toward Unity Against High-Tech Illiberalism and Disinformation
Tackling disinformation is essential to restoring trust in US democracy

Navigating the Benefits and Challenges of AI Implementation as New Threats Loom
How can security pros leverage AI effectively to protect against cyber-attacks?

Why COVID-19 Vaccine Disinformation is a Key Risk in 2021
How can misinformation online about COVID-19 vaccines be tackled?

#HowTo: Build a Business Case for Cybersecurity Investment
How can you successfully make the case for more cybersecurity investment?

Privacy Post-COVID: Predictions for 2021
What will be the major privacy challenges to organizations this year?

2021 Predictions: A Time to Reap Benefits from 2020’s Shift to ‘Remote Everything’
Will organizations focus on updating their security in 2021 following the shift to remote working?

How to Bridge the IT and Cyber Skills Gap in 2021
Educational programs must adapt to address the cyber skills gap

Making PCI Compliance a Good Habit
What causes a company’s compliance to slip, after the all-important first audit?

Five Common Excuses for Lack of Firmware Security
No one should assume their firmware is already secure – it is an ongoing process.

SAD Reality for DNS
This time it's SAD, in more ways than one

How to Transform Your Cybersecurity Posture
Not only does security by design lift your profits, it also places them on footing that’s stable.

























