Infosecurity Opinions
2016: Time for Security to Take its Head out of the “Sand” (box)
Containment is a fairly new concept, deviating from the widely known and popular “sandboxing” method.
The Virtual Mobile Infrastructure Debate is Mired in Myth
Regarding usability, VMI decriers assume that user experience must suffer. It must be too slow and sluggish, they say. It won’t feel native, they presume. It’s just too niche for most businesses, they claim.
Why Educating Employees is Key to Preventing the Risk of Shadow IT
Why aren’t staff practicing what they preach when it comes to data security?
National Infrastructure Attacks Mark Ominous Milestone for Cyber Security
The world of cybercrime expands each day, leading to the current state of affairs in which even national infrastructure organizations are vulnerable to the growing sophistication of hackers.
Handling Sensitivity in the Biotech World
A company responsible for financing of a firm has significant intelligence on the operations of an organization and how it intends to use the resources available.
Information Security Culture: It’s Time to Upgrade to 2.0
With the rapidly changing threats we now face, businesses need new approaches to information security and professionals that can think strategically about big picture challenges while having the tactical acumen and agility to respond to threats.
A New Era of Cyber Threats: The Infrastructure Hack
CNI is not immune to cyber-attacks - IoT, Big Data and cybercrime have increased the attack opportunity.
Joined up Justice - Exploring the Art of Possible through Digital Integration
Across Europe, central and local government departments are challenged by the need to drive greater digital initiatives enabling digital integration across their own department and the departments with which they collaborate and coordinate.
Four Qualities of a Successful Cybersecurity Start-up
Four of the common traits and strategies that are particularly relevant in the world of cybersecurity
The Need for IT Support to Evolve From Reactive to Proactive
For IT departments, the most visible indicators of success are making sure employee end-users can access critical applications and IT services whenever and wherever they need them and with sufficient performance to do their jobs.
Coping in a 'Code Yellow' World with Threat Intelligence
While there’s no specific threat identified, your mindset should be “the world is a potentially unfriendly place, I have to be on the lookout for potential threats”.
Top Five Ways to Improve SOC Efficiencies and Bridge the Security Skills Gap
Not only have enterprises bought more products, but they also have tried to hire more security analysts to deal with alerts.
Want to Know Your Customer? Try Authenticating Them
It’s no longer a question of “build or buy?”, but rather a matter of utilizing available tools to develop solutions that adapt to the challenges of protecting your users.
To Err Is Human; To Automate, Divine
99% of firewall breaches will be caused by simple firewall misconfigurations, not flaws.
Looking Past the ‘APT’ Hype to Defend Against Today’s (Actual) Advanced Threats
Much of the work in threat protection is focused on helping employees recognize and avoid sophisticated phishing attacks.
Life Sciences Information Security
A Broad Overview of the Unique Challenges Serving Biotech, Pharma and Academia.
Protecting the New Perimeter
Ultimately, recognizing the new perimeter and managing identities with SSO and provisioning will provide businesses with a better way to secure and control the magnitude of users, devices and applications that span traditional company and network boundaries.
Static Code Analysis Tools for Bulletproof Software Security
Manual security reviews are useful, but humans are humans after all, and they just aren't capable of finding every security hole within a large or even midsize application.
Could a Weak Link in the Chain Hamper Retailer Implementation of PCI DSS Version 3.2?
Application of the PCI DSS’s latest system is not a quick fix, but a means to an end.
Overcoming Application Security Challenges
The majority of strategic business processes are supported by software applications, so why does application security continue to receive less budget and attention than network security?