Infosecurity Opinions

Digital Identity Has Changed, and Enterprises Have Not Changed With It
As the number of enterprise apps has increased, so have new authentication methods and identity tools

The Online Harms Bill Cannot Wait
There is an urgent need to strengthen our defenses against this and other modern threats to keep children safe.

Coming out of the COVID Depression with a Cloud Security Strategy
All end users sent home from their private corporate networks are now “in” the cloud

CISO: Choose Your Weapon
The selection of security tools must provide the best security affordable and be manageable with the limitations of budget

#HowTo Improve the Security of Your Containers
How to embed security by design for containers.

What's Next After the Big 'Zero Trust' Welcome Back to the Office?
Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture

Is Critical Infrastructure Ready for Quantum?
Collectively, we want to realize all of the benefits of quantum without compromising security.

Misconfiguration on the Cloud is as Common as it is Costly
Remote work has opened profitable new horizons in cybercrime

Getting Your ‘Return’ to Work Strategy, Right
A robust data management strategy will affect our return to work, it will actually improve our working lives

Is Your Cloud Backup Ready to Handle a Crisis?
Keeping down cost and complexity in disaster recovery and business continuity

Securing Remote Operations with Digital Identity Management
Why identity management, on premise and as a service, is crucial to maintain remote worker security

Evolution to Becoming a Modern Day CISO
A CISO has to act as an educator, coaching and empowering both technology teams to understand the business goals

Forget Protection: Is Your SOC Ready to Defend?
Rebuilding the SOC means rethinking the roles of people who work in them

Cloud’s Silver Lining: Patching the Fluid Workforce
A new challenge is to maintain network changes in the long-term as many were implemented quickly and as a temporary solution

Kleptopredation in a Digital World
How malicious cyber actors increasingly leverage a hunting strategy borrowed from the world of marine biology, called Kleptopredation

The Future of Work and Protecting Your Cloud-Based Office from Cyber-Attacks
Not all businesses have the proper tech infrastructure in place to equip, support and manage productive remote working

#HowTo Build a Telegram Security Plan
Five ways to protect yourself with a telegram security plan

Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks
There is no foolproof method to ensuring you do not experience sinister cyber activity

The Anatomy of a SaaS Attack: Catching and Investigating Threats with AI
Little attention is given to how the TTPs in SaaS attacks differ significantly from traditional TTPs seen in networks and endpoint attacks

The Gig Economy: A New Battleground for Cybersecurity
The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.






















