Infosecurity Opinions
Unified Identity: the Passport to Secure Personal Data Management
Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.
Data Scientists vs. IT: Aligning on Open-Source Security
The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.
How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?
The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively
Handle Misconfigurations in the Cloud
Cloud misconfiguration is becoming a prevalent source of risk for organizations.
Demonstrating Scientific Data Integrity and Security in the Cloud
Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security
Digital Identity Has Changed, and Enterprises Have Not Changed With It
As the number of enterprise apps has increased, so have new authentication methods and identity tools
The Online Harms Bill Cannot Wait
There is an urgent need to strengthen our defenses against this and other modern threats to keep children safe.
Coming out of the COVID Depression with a Cloud Security Strategy
All end users sent home from their private corporate networks are now “in” the cloud
CISO: Choose Your Weapon
The selection of security tools must provide the best security affordable and be manageable with the limitations of budget
#HowTo Improve the Security of Your Containers
How to embed security by design for containers.
What's Next After the Big 'Zero Trust' Welcome Back to the Office?
Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture
Is Critical Infrastructure Ready for Quantum?
Collectively, we want to realize all of the benefits of quantum without compromising security.
Misconfiguration on the Cloud is as Common as it is Costly
Remote work has opened profitable new horizons in cybercrime
Getting Your ‘Return’ to Work Strategy, Right
A robust data management strategy will affect our return to work, it will actually improve our working lives
Is Your Cloud Backup Ready to Handle a Crisis?
Keeping down cost and complexity in disaster recovery and business continuity
Securing Remote Operations with Digital Identity Management
Why identity management, on premise and as a service, is crucial to maintain remote worker security
Evolution to Becoming a Modern Day CISO
A CISO has to act as an educator, coaching and empowering both technology teams to understand the business goals
Forget Protection: Is Your SOC Ready to Defend?
Rebuilding the SOC means rethinking the roles of people who work in them
Cloud’s Silver Lining: Patching the Fluid Workforce
A new challenge is to maintain network changes in the long-term as many were implemented quickly and as a temporary solution
Kleptopredation in a Digital World
How malicious cyber actors increasingly leverage a hunting strategy borrowed from the world of marine biology, called Kleptopredation