Infosecurity Opinions

Zero Trust: Method or Madness?

Zero Trust: Method or Madness?

Zero Trust is a method of security where the central premise is ridiculously simple: trust no one.

The Role of Automated Asset Management in Industrial Cybersecurity

The Role of Automated Asset Management in Industrial Cybersecurity

Without an up-to-date and accurate inventory of ICS assets, including the automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.

NIS Directive Is a Good Start for Railway Cybersecurity - But It's Not Enough

NIS Directive Is a Good Start for Railway Cybersecurity - But It's Not Enough

Although the NIS Directive represents an essential step towards securing critical infrastructure, its shortcomings are palpable with regard to the rail industry.

Go Overseas to Solve the US Infosecurity Talent Crunch

Go Overseas to Solve the US Infosecurity Talent Crunch

We need to create international security teams, not just those ones who are siloed by countries or individual companies.

Protecting your Network Against Ever-Changing Cyber-Attacks

Protecting your Network Against Ever-Changing Cyber-Attacks

In the age of IoT and cloud, it’s getting worse for these traditional defenses.

What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities

What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities

Attacks on OT systems are rapidly escalating, yet many industrial organizations continue to focus cybersecurity efforts on IT-centric, rather than production-centric, endpoints.

UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?

UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?

If we don’t take action and follow government guidelines on IoT, then Parliament will be forced to enact legislation.

Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts

Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts

Companies are adopting privileged account technology to monitor behavior and secure their sensitive data.

GDPR is a Good Idea For US Companies, Even if it is Not Law

GDPR is a Good Idea For US Companies, Even if it is Not Law

On the dawn of GDPR, and with the spotlight on major data breaches, perhaps the US is ready to take another run at data privacy regulation.

GDPR is Here, So What's Next for Cybersecurity Professionals?

GDPR is Here, So What's Next for Cybersecurity Professionals?

The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.

Why Supply Chain Security Should be a Strong Link

Why Supply Chain Security Should be a Strong Link

Supply chain threats warn that the UK should expect a higher volume of attacks, but also ones with an increased amount of planning.

Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach

Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach

The Equifax breach and WannaCry ransomware may have nothing in common, but both involved hackers who exploited unpatched vulnerabilities in Windows 7 and Windows 8.

What’s Hot on Infosecurity Magazine?