Infosecurity Opinions
Fighting Back Against DDoS
DDoS attacks will continue as targeted organizations pay the ransom fees
File Sharing: The Silent Threat
Employees secretly transfer various forms of confidential information to cloud-based file-sharing services.
Banking's Darkside Lurks in Your Inbox
While banks cannot and will not be able to stop all attacks, staying up to date on current threats and investing heavily in security teams and technology will most certainly help them prevent most.
Bridging the Gap Between Executive Cyber Awareness and Enterprise Security
IT security professionals are facing greater challenges than ever before and should be providing greater visibility into how cybersecurity programmes are performing.
Defending Against the APT Paradigm
With an APT, it is very difficult to profile an attack and get an idea on which technologies would have helped or mitigated the attacks.
Government Security and Data Breaches: Problems and Solutions
OPM made painfully clear the need for government (and other) organizations to adopt security policies.
A Love Letter to my Network
Network we have been through so much together and we look together to an exciting future.
How to "Nudge" Your Business Back to Better Mobile Security
Some businesses might think they're too small for a hacker to notice, but that’s a myth
Meeting the Security Needs of SMEs in the Cloud
Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.
There’s a RAT in Your Mobile
At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).
IP Cameras – The All-Seeing IoT Security Challenge
The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.
Out of Sight, Out of Mind?
It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.
Business Decisions: Is It Time to Outsource Your Network Security?
If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.
Locking Passwords Away – For Good
The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.
Single Sign-On: Taking a Global Approach
Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.
Top Ten Big Data Security and Privacy Challenges
To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges
Why Security Professionals Should Care about NoSQL and Big Data
The top five reasons you should care about NoSQL:
Changing the Rules of the Game
Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?
The Exponential Growth of DDoS Attacks
What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.
Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way
When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.