Infosecurity Opinions
The Service Desk: The Unsung Hero of IT Security
Estimates suggest that the gap between a data breach and discovery is somewhere in the region of 80 and 200+ days, depending on whose research you’re reading.
Considerations around NFV security
DNS security needs to be built into the NFV architecture
Regular Check-ups: Pentesting-as-a-Service
Penetration testing needs to be performed much more frequently than it is today by most organizations, and that requires a new type of service offering: ‘pentesting-as-a-service’.
Machine Learning – Keeping Us One Step Ahead of Fraudsters
While it is clear that machine learning has a lot to offer to financial institutions and merchants in an effort to detect and prevent fraud, the approach does have its limitations.
Why Weakening Encryption Could be Throwing the Baby Out with the Bathwater
Should communications providers be legally forced to break their own security when required, even if they must fundamentally change the way their encryption works in order to comply?
Walking the Line Between Data Protection and Privacy Invasion
While there has been growing awareness of what we should, as consumers, do to secure our data, how can we be assured our data is being appropriately cared when we hand over information to companies?
Evading IT Threats: Integrating Security in Your Overall Cloud Strategy
In cloud infrastructure, it becomes even more challenging to overcome such threats without incurring any losses.
How Context Can Provide Application-centric Security
It’s the applications themselves that are the targets, because that is where the data is housed.
Access Badges: The link between physical and logical access
Organizations using access badges to secure physical access to (all or part of) their premises increasingly ask for the ability to use the same badges for access to their network and applications.
Fighting Back Against DDoS
DDoS attacks will continue as targeted organizations pay the ransom fees
File Sharing: The Silent Threat
Employees secretly transfer various forms of confidential information to cloud-based file-sharing services.
Banking's Darkside Lurks in Your Inbox
While banks cannot and will not be able to stop all attacks, staying up to date on current threats and investing heavily in security teams and technology will most certainly help them prevent most.
Bridging the Gap Between Executive Cyber Awareness and Enterprise Security
IT security professionals are facing greater challenges than ever before and should be providing greater visibility into how cybersecurity programmes are performing.
Defending Against the APT Paradigm
With an APT, it is very difficult to profile an attack and get an idea on which technologies would have helped or mitigated the attacks.
Government Security and Data Breaches: Problems and Solutions
OPM made painfully clear the need for government (and other) organizations to adopt security policies.
A Love Letter to my Network
Network we have been through so much together and we look together to an exciting future.
How to "Nudge" Your Business Back to Better Mobile Security
Some businesses might think they're too small for a hacker to notice, but that’s a myth
Meeting the Security Needs of SMEs in the Cloud
Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.
There’s a RAT in Your Mobile
At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).
IP Cameras – The All-Seeing IoT Security Challenge
The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.