Infosecurity Opinions

CISOs: Here are the Cybersecurity Concerns Boards Really Care About
As companies tighten budgets going into 2021, it’s important to communicate security ROI in an understandable language

Account Takeover Risks of Small Businesses: How to Avoid Them
How to detect, and recover, from account takeover attacks

Is Encryption the Answer to Data Security Post Lockdown? #NCSAM
If businesses want to secure data on the move, it is essential that encryption and endpoint control is applied to all devices

Preventing Business Email Compromise Calls for Analyzing Email Language
Most email security tools are designed to look for the what and the who

Ripple20 Isn’t An Anomaly – IoT Security Is A Mess (Still) #NCSAM
Ripple20 isn’t the only IoT security fiasco, it’s just the latest

Mythbusters: Three Misconceptions About Zero Trust
What’s the key to achieving perfect Zero Trust?

Cybersecurity Lessons Learned from Data Breaches and Brand Trust Matters
Public confidence in your digital security – is make-or-break for your business, not just part of your compliance checklist.

Old Tools, New Tricks: How AI Can Extend Existing Security Investments to Meet New Challenges
Utilizing AI and machine learning technology really can be a game-changer for identity

How do Organizations Choose a Cloud Service Provider? Is it Like an Arranged Marriage?
Have you ever had to make a critical decision rationalised by clear value drivers but heavily reliant on trust?

The Digital Transformation Reckoning Caused By COVID-19
How companies survived a rapid and forced digital transformation.

Why Cybersecurity Alliances Are a 21st Century Necessity
Building cyber defenses beyond an organization are just as important as securing its own internal infrastructure.

#HowTo Launch a Remote SOC
Having SOC analysts work remotely during lockdown shows ‘going virtual’ is possible

CEOs Will be Responsible for IoT Security – Where Do They Start? #NCSAM
The auditing of IIoT needs to be done digitally using technology like distributed ledgers

Onslaught of Login (Brute Force) Attacks Shakes Enterprise IT Security
Brute force is an old method of attack but is still effective

Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey
The consequences of privileged identity exposure are potentially catastrophic, as the Twitter hack demonstrated.

How Hybrid Learning is Changing K-12 Cybersecurity
It’s up to everyone to keep cybersecurity, student safety, and data privacy top-of-mind through this shift.

Securing Remote Desktops During a Pandemic
Remote work is needed to ensure everyone has the flexibility they need to be productive under unpredictable circumstances.

Renew Your Vulnerability Management Program
Organizations should invest in vulnerability scanning solutions to gain visibility into all assets and vulnerabilities.

Maintaining Remote Workforce Productivity Without Peaking Privacy Concerns
COVID-19 has generated a new surge in popularity for surveillance technologies

Compromised Devices Await Office Return to Strike
Remote working has also put an increased focus on identity access management, credential theft, and privilege escalation
























