Infosecurity Opinions

Building a Blueprint for a Successful Micro-segmentation Implementation
How organizations can implement and manage SDN-enabled micro-segmentation strategies

How Prepared is Your Business to Face Botnet Threats
To be on the safe side, you need to understand the implications of these attacks and know the precautions to take

#HowTo Choose a Link Analysis Tool
These tools visualize data and draw relationships between otherwise disparate pieces of information

Securing Smart Cities of the Future
Managing the cyber-risks of smart cities is crucial in realizing their potential

How Traditional Machine Learning Is Holding Cybersecurity Back
Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats

The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering
How to take ownership of your data’s security as part of your cloud strategy

Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back
As the internet expands, and bots become more essential to maintaining it

Creating a Modern Office that Appeals to Techy Staff
Creating a great work environment is essential.

Using Machine Learning to Transform Data into Cyber Threat Intelligence
Combination of threat analysis and data analysis with machine learning can help security teams turn raw data into cyber threat intelligence.

Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach
Steps IT teams can take to achieve better cybersecurity for your remote workers.

Securing Active Directory
Every computer on the company’s network must have some level of access to AD for the network environment to function correctly.

Losing the Human Touch to Protect Data
Why it is important to remove users from the equation if we want to protect data and deliver inherent security

Delving Into the Weaponization of AI
To the surprise of almost no-one, AI is being weaponized by cyber adversaries.

No Time for Email Protection Roulette
Extra caution should be exercised when safeguarding not just what’s coming in, but also what’s going out, via email.

Dealing with Legacy Open Source—Issues and Solutions
An alarming number of organizations consuming open source are not applying the patches they need

Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer
The number of “bad bots” continues to grow.

#HowTo Make Security Expertise Accessible to Developers
How security champion programs can make security expertise accessible to developers

Checkmate: Cybersecurity Strategy on the Modern Battlefield
It is World Chess Day! What can modern cybersecurity learn from the game of chess?

How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World
Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.

Cybersecurity Recuperation: Ensuring a Safe Return to Work
Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.






















