Infosecurity Opinions

#HowTo: Optimize Your 2021 Security Spend
How do you reduce your security risk with tightened budgets?

Security from the White House
How President-elect Joe Biden can tackle a challenging cybersecurity landscape.

From BIAS to Sweyntooth: Eight Bluetooth Threats to Network Security
Bluetooth has a history of vulnerabilities that continues to put corporations at risk of a major security breach

#HowTo Write the Perfect Op-Ed, and Get it Published!
Outgoing deputy editor Dan Raywood offers advice on how to produce the perfect opinion article

Credential Stuffing – Are You Doing Enough?
Why an old style attack just will not go away.

Financial Services Industry Under Attack from a Surge in Credential Stuffing
Compromised credentials are a threat to multiple sites when a data breach occurs

Is it Time to Rethink Cybersecurity Training?
What businesses can do to engage/educate their employees more effectively.

Combating the Rising Cyber Threat Against ICS
ICS systems face a continual threat of attack, and the risk is growing

#HowTo Support a Zero Trust Model with Automation
How security and IT operations teams can implement Zero Trust and improve the security posture across hybrid cloud infrastructures.

Is it Time for the Network to Shoulder More of the Burden of Information Security?
It’s time ISPs became allies rather than observers

Security Initiatives Businesses Must Adopt to Survive in This New World
If organizations fail to adapt to this new reality, it could leave them unable to pivot quickly

Decrypting Diversity and Inclusion in Cybersecurity
How to improve awareness of opportunities for women and help sustain from STEM to the workforce

The Unintended Data Security Consequences of Remote Collaboration
Every Team or chat created is yet another potential exit point for sensitive data.

Using Security Automation to Stay a Step Ahead in these Challenging Times
How to use automation throughout security efforts to better focus resources and build assurance into security controls and operations

#HowTo Create a Hybrid Remote and Office Work Model
Five ways IT and security managers can plan for a hybrid work model

Don’t Cut Corners while Running LAPS
Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.

The Cyber Sleeper Cells Lying in Wait for the Return to the Office
Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices

Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?
There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm

The Ongoing Threat of Telecoms Fraud
It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.

Overcoming Healthcare’s Cybersecurity Challenges
Six recommendations for improving cybersecurity in healthcare























