Infosecurity Opinions
For Enterprise Cybersecurity, Think Modern Metropolis, not Fortress
Cybersecurity is less a fortress, and more of a metropolis—with porous and amorphous boundaries.
Bootstrap Businesses Should Follow These Principals to Survive
When building a business, focus on transparency, flexibility, efficiency, responsibility and passion.
The Danger with Data in a Changing European Landscape
Following the significant announcement of the GDPR, this has highlighted the importance of companies getting a handle on their data.
Tackling The Impact Of Fraud By Utilising Machine Learning Tactics
Fraudulent activity such as ‘account takeover’ and ‘application fraud target vulnerable people and fraud systems that rely on rules can’t keep up with changing attacks.
How To Spot And Block Bad Bots
Some website owners won’t do anything about bots, ultimately granting the bad bots unfettered access right alongside the good bots.
Hack Me: A Geopolitical Analysis of the Government Use of Surveillance Software
Hacking Team-style methodologies represent a new era of cyber-espionage—and they’re on sale for any government willing to pay. This is where ethical ambiguity comes in.
Delivering On Data Privacy and Security
Many people have pretty much accepted that everyone is spying on everyone. This has potentially very worrying consequences for the consumer, who is potentially vulnerable and has very little means of recourse.
The Big Switch and Mobile Security
The Big Switch showed us the value of centralization and how cloud computing is the application of an old logic. But this logic has been forgotten when it comes to mobile security and needs to be revitalized.
IoT requires strong authentication, paired with encryption, to succeed
As we look to encrypt the IoT, we can’t overlook the need for strong, binding authentication to protect device access and user privacy
Tackling Data Breach Impact: Machine Learning
How can machine learning fraud systems provide a cutting-edge solution to protecting revenues and reputation?
Responding to insider threats
More than one-third of all cybercrime incidents and security breaches are caused by insiders, each with individual motivations, but the common factor is inappropriate access to critical-value data. How do you design and implement an insider threat program
Will 2016 be the Year of Ransomware?
Breaches of personally identifiable information occurred in epidemic proportions during 2015, will that threat be overtaken by threats from the recent proliferation of ransomware in 2016?
Generation Z: Adept With Technology but Vulnerable to Fraud
The so-called Generation Z is probably more vulnerable than any other to fraud and reputational damage, brought about by their online activity
Privacy Best Practices for Developers
Concerns about data collection are rising, both from a user and a collector point of view. End users, whether they are employees or customers, are requesting a higher level of respect towards their privacy and putting forward more questions as to how and why their personal data is handled.
Can we protect data without prying?
Are cybersecurity and privacy mutually exclusive, or is it possible to have both?
Keeping Data Secure: A Happy Marriage of Hardware & Software
We're now at a point where there's a crisis of trust, where cybersecurity is a fundamental requirement for modern computing. Robust security hardware and software is key to securing data
Talking the TalkTalk in a Week of Cyber-Insecurity
If we take any positives from the TalkTalk, Marks & Spencer and British Gas breaches it should be that they highlight just how critical it is to have intelligent security strategies in place
The IoT: Tech revolution or privacy nightmare?
People are sold on the idea that a colossal network of devices and sensors will make their lives easier, cheaper and less busy. But there is another view that must be considered.
How to Maximize an Investment in Security and Compliance
The high frequency of cyber-attacks leads to an important question that make you want to ask: should your company be doing more to secure data, or are breaches simply inevitable?
The Encryption Fallacy
It has become quite fashionable these days to say ‘if only the information had been encrypted’. The problem is not that simple, either from a privacy or security perspective.