Infosecurity Opinions
A Love Letter to my Network
Network we have been through so much together and we look together to an exciting future.
How to "Nudge" Your Business Back to Better Mobile Security
Some businesses might think they're too small for a hacker to notice, but that’s a myth
Meeting the Security Needs of SMEs in the Cloud
Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.
There’s a RAT in Your Mobile
At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).
IP Cameras – The All-Seeing IoT Security Challenge
The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.
Out of Sight, Out of Mind?
It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.
Business Decisions: Is It Time to Outsource Your Network Security?
If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.
Locking Passwords Away – For Good
The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.
Single Sign-On: Taking a Global Approach
Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.
Top Ten Big Data Security and Privacy Challenges
To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges
Why Security Professionals Should Care about NoSQL and Big Data
The top five reasons you should care about NoSQL:
Changing the Rules of the Game
Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?
The Exponential Growth of DDoS Attacks
What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.
Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way
When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.
Defence in Breadth
Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.
How Do You Really Know if Your Software Security Measures Up?
Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.
How Can You Fend Off a Nation?
While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.
Liability Can Change Attitudes to Corporate Cybersecurity
As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.
‘Dark DDoS’ – a growing cyber security threat for 2016
A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.
Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else
When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.