Infosecurity Opinions
Out of Sight, Out of Mind?
It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.
Business Decisions: Is It Time to Outsource Your Network Security?
If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.
Locking Passwords Away – For Good
The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.
Single Sign-On: Taking a Global Approach
Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.
Top Ten Big Data Security and Privacy Challenges
To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges
Why Security Professionals Should Care about NoSQL and Big Data
The top five reasons you should care about NoSQL:
Changing the Rules of the Game
Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?
The Exponential Growth of DDoS Attacks
What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.
Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way
When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.
Defence in Breadth
Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.
How Do You Really Know if Your Software Security Measures Up?
Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.
How Can You Fend Off a Nation?
While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.
Liability Can Change Attitudes to Corporate Cybersecurity
As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.
‘Dark DDoS’ – a growing cyber security threat for 2016
A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.
Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else
When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.
The Burst of the EMV Bubble
Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.
Passivity may risk Security and Reliability of your Active Directory
Top tips on turning an Active Directory implementation into a dream scenario.
Protecting Corporate Data without Compromising on Experience
The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.
Changing the Security Team’s Focus from Malware to the Credentials that Enable It
Once an attacker has access to a good set of credentials, its game, set and match.
Victims or Villains: Intelligent Incident Response Can Save the Day
Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.