Infosecurity Opinions
Dealing with Legacy Open Source—Issues and Solutions
An alarming number of organizations consuming open source are not applying the patches they need
Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer
The number of “bad bots” continues to grow.
#HowTo Make Security Expertise Accessible to Developers
How security champion programs can make security expertise accessible to developers
Checkmate: Cybersecurity Strategy on the Modern Battlefield
It is World Chess Day! What can modern cybersecurity learn from the game of chess?
How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World
Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.
Cybersecurity Recuperation: Ensuring a Safe Return to Work
Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.
Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting
Security teams need to exercise an awareness of what methods are becoming newly popular among bad actors
Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity
Why compliance certifications prove that you uphold best industry practices
Using Threat Deception to Thwart Malicious Insiders
Like death and taxes, malicious insiders are a certainty of life
Stop Ignoring Two-Factor Authentication Just Because You’re Lazy
Laziness literally becomes the weakest point in their data protection systems
Improving Banking Experiences with Biometrics
Using the correct biometrics will enable banks and financial institutions to enhance customer experiences
Data Exchange and Collaboration Can Bring Digital Forensics Down to Size
Focusing on data exchange and collaboration can go a long way toward making swift data collection
An Unfortunate Reality for Virtualized Systems
It is important that organizations recognize that virtualization and VMs are not flawless
A Concerning Proliferation of SIM-Swapping Fraud in Europe
SIM swapping requires substantial effort and costs from attackers, so high net worth individuals are targeted.
#HowTo Neutralize Wide-Area Network Cyber-Threats
Proven measures to protect an enterprise WAN during a crisis and otherwise
Passwords Create More Vulnerabilities Than Ever
As users suffer from password fatigue and default to password reuse, cyber-criminals are making it their mission to take advantage of this carelessness
Is GDPR Really a Two-Year Success Story?
To keep GDPR fit for purpose, a number of changes still need to be made and more clarity is needed
The Digital Generation Will Become the Cyber-Criminal’s Dream
The first truly digital generation will bring different attitudes with them, including information sharing
The Pursuit of Productivity: DevOps, PrivacyOps and AIOps
DevOps, PrivacyOps and AIOps have been in practice by the IT and data privacy sector
Platform as a Service Solutions Are Secure: Unless You Misconfigure Them
PaaS has allowed anyone within an organization's information technology infrastructure to take charge of its governance