Infosecurity Opinions
#HowTo: Protect Critical Infrastructure from Cyber-Criminals
Given today’s cyber-threat landscape, critical infrastructure enterprises should be looking to adopt increasingly flexible and varied security solutions
Security and Compliance Risks Associated With the Merger and Acquisition Process
Mergers and acquisitions provide new processes and technologies that can mitigate risks
The 5 Golden Rules of Cyber-War
Cyberspace is now the 5th domain of warfare recognized by NATO alongside land, air, sea and space
Modern Challenges in Securing Multi-Cloud Environments
Why cloud security best practices will continue to evolve as organizations better understand the environment
Data Protection When Cyber-Attacks Are Rife
How organizations and employees can stay one step ahead of the rapidly evolving threats
The Privilege Is Mine: Protecting Endpoints From Compromised Credentials
Why staying on top of endpoints will strengthen security defenses and keep sensitive data safe
3 Key Reasons Zero Trust Network Access is Critical for Today's Mobile Worker
Networks have to be secure, but that security shouldn’t prevent innovation and forward movement in business
Phishing Is an Insider Risk - It's Time to Tackle It Like One
Employees are your last line of defense from phishing – empower them, and you can turn them into your biggest strength
What Happens When You Give Excessive Access Rights to Employees
Strengthening your security with authentication and monitoring will keep your company’s data secure
#HowTo: Protect Against Remote Code Execution Attacks
Organizations must understand how their software runs and have the capability to stop any digression in milliseconds
Haugen Testimony Shows Cybersecurity Researchers Must Also Consider Mental Health
Cybersecurity researchers have the potential to improve the lives of tens of millions of people
The Three OT Security Dangers of R&R
Why upfront thought, strategic planning and a bit of patience will go a long way
4 Reasons Why Companies Fail to Fix Cloud Misconfigurations
Lack of cloud security knowledge, team alignment, visibility and speed explain why companies suffer misconfiguration breaches
Least Privilege Regaining Popularity
Why zero trust provides added scalability required to secure modern multi-cloud environments
Digesting the Alphabet Soup - Can EDR and MDR Co-exist?
How teams can best leverage a portfolio of detection and response strategies
#HowTo: Implement a Strong Cybersecurity Program for Small Businesses
How can small businesses develop cost-effective security programs
A Recipe for Destruction: Municipalities and Managing Cyber Risk
From Baltimore to Birmingham, Paris to Portland, municipalities are under attack
Implementing Zero Trust Principles in a Connected World
Foundational controls and measures determine if zero trust achieves security goals
The Journey to Zero Trust Begins with Identity
Identity is the fabric that ties the zero trust framework together
The Hard Truth About Network Security
Failing to secure identities and data in the public cloud will jeopardize an enterprise