Infosecurity Opinions
Cybersecurity isn’t Rocket Science!
Thinking about your organization’s data security infrastructure in terms of medieval warfare will actually help you to consider all of the potential threats posed to it, and most importantly, give you the insight you need to create a robust security infrastructure
The Rising Tide of Android Malware
As the mobile market matures, thieves are discovering new ways to exploit this captive audience of mobile users.
Man and Machine: A Match Made in Cybersecurity Heaven
I’m not suggesting that security analysts should be replaced by automated systems, rather, they should complement one another.
Software Defined Security: Going Beyond Traditional Measures
By adopting the SDSec model, businesses can realize the benefits of programmability and automation, which will consequently enable them to respond to today’s security threats in a more dynamic, efficient and intelligent way.
Rebuilding Digital Trust in The Age of The Hack
We now live in an “Allternet” world, where all people, products and places are hyper-connected and fundamental shifts in how we interact and trust each other are emerging.
How Can Your Company Radically Curb Insider Threat?
At Zalando, our internal bug bounty program underlines the need to hack, learn from mistakes, and in the process, develop the most secure products.
Exploiting SS7 Vulnerabilities in Mobile Networks for Criminal Gain
Signaling System Number Seven, or SS7, is a widely-used protocol that enables mobile operators’ subscribers to communicate with each other. At the heart of an operator’s network, SS7 contains highly important data such as a subscriber’s identity, status and location, providing the operator with the ability to manage communications and bill their subscribers for the services they use.
The SS7 Security Threat is Real. How Can MNOs Respond?
It was only a matter of time, but the shortcomings of SS7 have become an issue impossible to ignore.
Data Breaches – Just a Cost of Doing Business or Tip of the Spear for Threats to Business?
Now that major data breaches have become so commonplace, there is a growing perception that they are inevitable costs of doing business and resulting costs need to be paid, with the fallout contained as quickly as possible—and move on.
Metadata as a Divining Rod for Security
Most security tools are not equipped to handle the increases in traffic speed as well as attack frequency
SOC Up and Listen
It’s often said that listening is a skill in itself, and yet we’ve yet to grasp the nuances of listening to network noise. From the chatter on social media, to the deep recesses of the subterranean dark web, there’s now a vast array of data that we need to tap into, monitor and interpret to get advance warning before threats are realized.
What You Need to Know About Secure Voice Recording and Storage in Financial Services
With such a wide range of services covered in MiFID II, there are inevitably changes that may not receive due attention.
Gone in Less Than 60 Seconds: Why the Automotive Industry Needs to Get up to Speed with Security
Given that our cars are going to communicate even more in the future, it’s imperative we get this right now to stop the hacker getting into the driving seat.
Confronting the Talent Shortage: How to Invest in Your Existing Cybersecurity Staff
To advance security in the face of talent, time and other shortages, we need to think bigger than training.
Time to Get Quick on Your Feet: Navigating the Network Security Minefield
Cyber-space is the land of opportunity for hacktivists, terrorists, and criminals motivated to wreak havoc, commit fraud, steal information, or take down corporations and governments. They can hide out in the dark web, geographically removed from the scene of their crimes, launching automated attacks on thousands of targets knowing a fraction will succeed.
What Exactly is Quantum Cybersecurity Anyway?
Over the past few years, we’ve seen a seemingly endless stream of tech and mainstream media headlines on the topic of quantum technology developments, primarily focusing on quantum computers, their capabilities, and the threat they pose to cyber-security infrastructure as we know it.
Shrinking the Exploding Attack Surface
Nowadays, it seems that no organization is immune from being hacked; and governments globally are recognizing the need to invest heavily to protect vital services and infrastructure. However, today’s security models are not completely flawed; they are, perhaps, naïve.
Design Vulnerabilities: They Hide and You can’t Catch Them
Exploiting memory-corruption bugs to compromise computers and gain access to organizations is all too common and relatively simple. But what we haven't heard much about are so-called design vulnerabilities in operating systems or other software that can provide other avenues of attack into an organization's network.
Thin Clients and Isolation; is the Future of Computing off the Desktop?
The future of computing, at least personal computing, has been showing signs of weaning away from the traditional desktop for quite some time now.
How Psycholinguistics helps you Spot Potential Danger to your Company Before it’s too Late
How can you tell if someone going through a personal crisis poses a threat to your company? Is a disgruntled employee about to steal sensitive data or sabotage one of your key systems?