Infosecurity Opinions
How should businesses deal with social media risks?
There is a simple solution to the risks of social media, however; it might not be possible for many businesses.
The Need for Data Centric Security
Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?
Uncovering Covert Attack Communications Inside Your Network
Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.
For Enterprise Cybersecurity, Think Modern Metropolis, not Fortress
Cybersecurity is less a fortress, and more of a metropolis—with porous and amorphous boundaries.
Bootstrap Businesses Should Follow These Principals to Survive
When building a business, focus on transparency, flexibility, efficiency, responsibility and passion.
The Danger with Data in a Changing European Landscape
Following the significant announcement of the GDPR, this has highlighted the importance of companies getting a handle on their data.
Tackling The Impact Of Fraud By Utilising Machine Learning Tactics
Fraudulent activity such as ‘account takeover’ and ‘application fraud target vulnerable people and fraud systems that rely on rules can’t keep up with changing attacks.
How To Spot And Block Bad Bots
Some website owners won’t do anything about bots, ultimately granting the bad bots unfettered access right alongside the good bots.
Hack Me: A Geopolitical Analysis of the Government Use of Surveillance Software
Hacking Team-style methodologies represent a new era of cyber-espionage—and they’re on sale for any government willing to pay. This is where ethical ambiguity comes in.
Delivering On Data Privacy and Security
Many people have pretty much accepted that everyone is spying on everyone. This has potentially very worrying consequences for the consumer, who is potentially vulnerable and has very little means of recourse.
The Big Switch and Mobile Security
The Big Switch showed us the value of centralization and how cloud computing is the application of an old logic. But this logic has been forgotten when it comes to mobile security and needs to be revitalized.
IoT requires strong authentication, paired with encryption, to succeed
As we look to encrypt the IoT, we can’t overlook the need for strong, binding authentication to protect device access and user privacy
Tackling Data Breach Impact: Machine Learning
How can machine learning fraud systems provide a cutting-edge solution to protecting revenues and reputation?
Responding to insider threats
More than one-third of all cybercrime incidents and security breaches are caused by insiders, each with individual motivations, but the common factor is inappropriate access to critical-value data. How do you design and implement an insider threat program
Will 2016 be the Year of Ransomware?
Breaches of personally identifiable information occurred in epidemic proportions during 2015, will that threat be overtaken by threats from the recent proliferation of ransomware in 2016?
Generation Z: Adept With Technology but Vulnerable to Fraud
The so-called Generation Z is probably more vulnerable than any other to fraud and reputational damage, brought about by their online activity
Privacy Best Practices for Developers
Concerns about data collection are rising, both from a user and a collector point of view. End users, whether they are employees or customers, are requesting a higher level of respect towards their privacy and putting forward more questions as to how and why their personal data is handled.
Can we protect data without prying?
Are cybersecurity and privacy mutually exclusive, or is it possible to have both?
Keeping Data Secure: A Happy Marriage of Hardware & Software
We're now at a point where there's a crisis of trust, where cybersecurity is a fundamental requirement for modern computing. Robust security hardware and software is key to securing data
Talking the TalkTalk in a Week of Cyber-Insecurity
If we take any positives from the TalkTalk, Marks & Spencer and British Gas breaches it should be that they highlight just how critical it is to have intelligent security strategies in place