fbpx

Latest Security Opinions


Using Public WiFi Safely

The spread of this easily accessible Wi-Fi has enabled people on the move to do everything from check their emails to watch videos online. But users should log into these services with caution as malicious actors regularly attempt to steal sensitive data through unsecured connections.


The fight against keylogging attacks

Keyloggers are designed to track successive keystrokes made on a keyboard and generally operate without the device user being aware.


Creating a security-first culture

hile technology clearly has a critical role to play in stopping attacks from being successful, providing employees with the know-how and understanding of the threats they face is vital.


Cloud cybersecurity in a hybrid working world

Gaining a complete view of what data is stored in the cloud, who is using it and where it is being accessed can be vital in uncovering the presence of malicious actors.


The art of manipulation: Protecting your business against attacks

Do you know how many people have access to your businesses core systems? Chances are it’s more than you think, and the bad news is that every one of them represents a potential entry point for cybercriminals.


2021 Playbook: Enforcing Zero Trust for All Identities

Adopting a Zero Trust mindset means organisations are able to ditch the outdated ‘trust but verify’ approach and instead embrace a ‘never trust, always verify’ security stance, and ensures organisations stay ahead of the security curve.


How to Select the Right Cybersecurity Career Path

Those doing these early cybersecurity jobs ended up knowing a bit about everything and evolved into generalists. Since then, with so many new avenues of technology, most of these generalists either specialised or went into management. New recruits don’t have time to acquire the historical knowledge of generalists


False positives are only one part of a bigger cybersecurity problem

False positives are a symptom of a problem, not the cause Security ‘alert fatigue’ is a real issue. According to a recent report from the SANS Institute, alert fatigue is one of the biggest barriers to retaining top security talent. Many of the most common security tools, including security incident and event management (SIEM) tools… Read More


The Three Pillars Of A Resilient Ransomware Strategy

Building a resilient defense against ransomware is becoming a ‘must-have’ for any organisation that takes the risks seriously and wants to protect its IT ecosystem from the downtime, disruption, and cost that frequently come with ransomware infections.


What will be your organisation’s “go or no go” moment?

However powerful your leadership, however large your organisation, however advanced your systems and however well trained your personnel, the success or failure of your critical systems can be decided in one small “go or no go” moment


DevSecOps: Eight tips for truly securing software

Essential guidance for keeping software truly secure A lot has been said about DevSecOps from experts, practitioners, pundits and vendors. However, recommendations that start and finish with securing code leave critical gaps. In order to keep software secure, businesses must go beyond just securing the code they are developing to also secure the pipeline that delivers that… Read More


Why diversity should be at the forefront of identity

Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.