Infosecurity Opinions
Commercializing Health Data: Where do we Draw the Line?
What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?
COVID-19 Demonstrates Need for Human Error-Proof Security
80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security
How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy
There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.
#HowTo Evaluate the Security of New Applications
Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable
Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?
In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN
Unified Identity: the Passport to Secure Personal Data Management
Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.
Data Scientists vs. IT: Aligning on Open-Source Security
The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.
How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?
The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively
Handle Misconfigurations in the Cloud
Cloud misconfiguration is becoming a prevalent source of risk for organizations.
Demonstrating Scientific Data Integrity and Security in the Cloud
Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security
Digital Identity Has Changed, and Enterprises Have Not Changed With It
As the number of enterprise apps has increased, so have new authentication methods and identity tools
The Online Harms Bill Cannot Wait
There is an urgent need to strengthen our defenses against this and other modern threats to keep children safe.
Coming out of the COVID Depression with a Cloud Security Strategy
All end users sent home from their private corporate networks are now “in” the cloud
CISO: Choose Your Weapon
The selection of security tools must provide the best security affordable and be manageable with the limitations of budget
#HowTo Improve the Security of Your Containers
How to embed security by design for containers.
What's Next After the Big 'Zero Trust' Welcome Back to the Office?
Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture
Is Critical Infrastructure Ready for Quantum?
Collectively, we want to realize all of the benefits of quantum without compromising security.
Misconfiguration on the Cloud is as Common as it is Costly
Remote work has opened profitable new horizons in cybercrime
Getting Your ‘Return’ to Work Strategy, Right
A robust data management strategy will affect our return to work, it will actually improve our working lives
Is Your Cloud Backup Ready to Handle a Crisis?
Keeping down cost and complexity in disaster recovery and business continuity