Infosecurity Opinions

Don’t Cut Corners while Running LAPS
Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.

The Cyber Sleeper Cells Lying in Wait for the Return to the Office
Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices

Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?
There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm

The Ongoing Threat of Telecoms Fraud
It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.

Overcoming Healthcare’s Cybersecurity Challenges
Six recommendations for improving cybersecurity in healthcare

Partitioned Endpoints Pair Security with Convenience for Home Working
An endpoint architecture to enable safe, secure and productive home working.

#CyberMonday Risks of a Locked-Down Festive Period for Online Retailers
It’s highly likely that retailers will still be relying heavily on their online operations to make much needed sales before Christmas.

2020 Was the Year of the Great VPN Comeback, or Was It?
In this era of remote and mobile work, legacy, hardware-based VPNs have passed their prime

Bot is the New Black (Friday): How Retailers Can Fight Back
Black Friday isn’t only time retailers have to worry about automated shopping bots

Why Twitter’s High-Profile Users Need to Personally Embrace Security
This is an indication of the importance Twitter holds to those in the higher ranks of society.

Authenticate and Survive – Why Current Options Are Better than Ever
As employees gain more access to important information, the need for greater security increases.

Stop Punching in the Dark
The blind spot of visibility is not only going unaddressed, it’s getting bigger and bigger

Cyber Resilience During Times of Uncertainty
A cyber resilience approach is based on the premise of organizing defenses to prioritize resiliency over security to keep your business going

#HowTo Master Cybersecurity Training with a Third Party
Without specialist in-house teams, staying on top of cybersecurity matters is a challenge for SMBs

What Can We Learn About Cybersecurity From the 2020 Elections?
Lessons learned from this election, and for what can be utilized in the future

Why Don’t You Have a Certificate Manager?
Certificate management is important and few enterprises have the necessary talent and expertise to do the job

Countering Threat Data Overload: The Importance of Curation
Why data curation is the future of threat intelligence

Proactively and Securely Reducing Your Organization’s Data Footprint
Active data erasure is one aspect that is essential.

The Need for Continuous Authentication
Implementation of continuous authentication schemes should be transparent to employees

Why Cybersecurity isn’t What You Think it is
Are we all becoming cybersecurity snobs?
























