informa

Commentary

Organizations Must Brace for Privacy Impacts This Year
Expect more regulatory and enforcement action in the US and around the world.
January 26, 2023
Expect more regulatory and enforcement action in the US and around the world.
by J. Trevor Hughes, President & CEO, IAPP
January 26, 2023
3 MIN READ
Article
Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
January 25, 2023
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
by Zur Ulianitzky, Head of Security Research, XM Cyber
January 25, 2023
5 MIN READ
Article
Can't Fill Open Positions? Rewrite Your Minimum Requirements
If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.
January 25, 2023
If you or your company can't find good infosec candidates, consider changing up the qualifications to find more nontraditional talent.
by Robin Hicks, Manager, Assurance and Advisory, Technology, Cox Enterprises
January 25, 2023
4 MIN READ
Article
Chat Cybersecurity: AI Promises a Lot, but Can It Deliver?
Machine learning offers great opportunities, but it still can't replace human experts.
January 24, 2023
Machine learning offers great opportunities, but it still can't replace human experts.
by Dane Sherrets, Senior Solutions Architect, HackerOne
January 24, 2023
4 MIN READ
Article
Security and the Electric Vehicle Charging Infrastructure
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
January 24, 2023
When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
by Shachar Inbar, VP, Head of Business Operations and Information Security, Driivz
January 24, 2023
5 MIN READ
Article
Hunting Insider Threats on the Dark Web
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
January 23, 2023
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
by Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
January 23, 2023
4 MIN READ
Article
The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly apply patches to ensure that IoT devices are secure.
January 20, 2023
Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly apply patches to ensure that IoT devices are secure.
by Daniel dos Santos, Head of Security Research, Forescout's Vedere Labs
January 20, 2023
4 MIN READ
Article
Name That Toon: Poker Hand
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 19, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 19, 2023
1 MIN READ
Article
Ethically Exploiting Vulnerabilities: A Play-by-Play
There's a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company's defenses against malicious attacks.
January 19, 2023
There's a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company's defenses against malicious attacks.
by Joseph Carson, Chief Security Scientist, Advisory CISO, Delinea
January 19, 2023
5 MIN READ
Article
ChatGPT Opens New Opportunities for Cybercriminals: 5 Ways for Organizations to Get Ready
From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks.
January 18, 2023
From updating employee education and implementing stronger authentication protocols to monitoring corporate accounts and adopting a zero-trust model, companies can better prepare defenses against chatbot-augmented attacks.
by Paul Trulove, CEO, SecureAuth
January 18, 2023
4 MIN READ
Article
Cybersecurity and the Myth of Quiet Quitting
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
January 18, 2023
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
by Lynsey Wolf, Global i3 Investigations Team Lead, DTEX
January 18, 2023
4 MIN READ
Article
Why Businesses Need to Think Like Hackers This Year
Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It's time to learn to think and act like an attacker to cope with the cyber "new normal."
January 17, 2023
Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It's time to learn to think and act like an attacker to cope with the cyber "new normal."
by Haris Pylarinos, Founder and CEO, Hack The Box
January 17, 2023
5 MIN READ
Article
5 Cybersecurity Tips for Higher Education Institutions
Following these basic cybersecurity hygiene policies can help make data more secure and protect colleges and universities from becoming the next ransomware headline. The steps aren't complicated, and they won't break the bank.
January 17, 2023
Following these basic cybersecurity hygiene policies can help make data more secure and protect colleges and universities from becoming the next ransomware headline. The steps aren't complicated, and they won't break the bank.
by William J. Kyrouz, Director of Information Security, Jenzabar
January 17, 2023
4 MIN READ
Article
The Dangers of Default Cloud Configurations
Default settings can leave blind spots but avoiding this issue can be done.
January 16, 2023
Default settings can leave blind spots but avoiding this issue can be done.
by Nathan Schmidt, Principal Security Architect, Sonrai Security
January 16, 2023
4 MIN READ
Article
Fast-Track Secure Development Using Lite Threat Modeling
Establish clear and consistent processes and standards to scale lite threat modeling's streamlined approach across your organization.
January 13, 2023
Establish clear and consistent processes and standards to scale lite threat modeling's streamlined approach across your organization.
by David Lindner, Chief Information Security Officer, Contrast Security
January 13, 2023
4 MIN READ
Article