Infosecurity Opinions
Is GDPR Really a Two-Year Success Story?
To keep GDPR fit for purpose, a number of changes still need to be made and more clarity is needed
The Digital Generation Will Become the Cyber-Criminal’s Dream
The first truly digital generation will bring different attitudes with them, including information sharing
The Pursuit of Productivity: DevOps, PrivacyOps and AIOps
DevOps, PrivacyOps and AIOps have been in practice by the IT and data privacy sector
Platform as a Service Solutions Are Secure: Unless You Misconfigure Them
PaaS has allowed anyone within an organization's information technology infrastructure to take charge of its governance
Protecting Mobile Users: Why Wi-Fi 6 Offers Robust Security and Enhanced Usability
Wi-Fi 6 features major security enhancements that have eliminated some of the weaknesses of older wi-fi technology
Encryption Holds the Key for Avoiding Fines from Data Privacy Violations
Regulatory bodies are establishing regulations to protect consumers’ personal data that is used in organizations.
Myth Busting on Biometric Authentication
Debunking five common myths and demonstrate the reality of how biometrics can keep us more secure
No Better Time to Propose U.S. Consumer Data Privacy and Security Act
Looking at the recently proposed U.S. Consumer Data Privacy & Security Act.
Bridging the GRC and Security Divide
If you had to categorize the relationship between GRC and cyber, you’d at best have to say: ‘it’s complicated.’
SIM Swap - The Silent Hacker
A SIM swap can be the first identifier that a breach has happened.
#HowTo Not Make Backups: Do You Really Want to Protect Your Data?
Although backups are a critical element of incident response, they can be used against companies unless set up properly.
Improving Email Security is About Disguising a Secure Solution as Email, Not Trying to Fix its Protocols
Typical email protocols lack a lot of features that are essential from a security and privacy perspective
VPN Split-Tunneling – To Enable or Not To Enable
How VPN split-tunneling can create additional risks and benefits to entities utilizing VPNs.
Cybercrime Has Undergone an Industrial Revolution – How to Keep Up
Knowing how cyber-criminals use the services can provide an understanding of the threats they’re up against.
Who Owns Responsibility for Industrial Cybersecurity?
Securing CNI is often considered to be a joint responsibility between the private and public sectors.
The New Normal: Working from Home and Extending Perimeter Defenses
Remote work has grown by 400 percent in the last ten years and enterprises should be aiming for Secure Access anytime, anywhere, from any device.
Launching a Vendor Risk Management Program with Limited Resources
With third-party data breaches affecting all organizations, a VRM program is necessary to help safeguard organizations from an attack.
Landmark International Data Transfer Case Boosts EU Data Privacy Laws
How a recent political precedent affects future data protection laws
Remote Work Highlights the Need For a People-Centric Approach to Cybersecurity
Humans are harder to protect than machines — but just as important
The Art of (Phone) War: How Consumers Can Fight Back When Phone Companies Sell Their Personal Data
How and why phone companies are selling consumer data along with tools and resources to fight back and protect customer privacy.