Infosecurity Opinions
AI and Data Privacy: Compatible, or at Odds?
How do we leverage the best of what AI has to offer without compromising data privacy?
Data Protection – Another COVID-19 Casualty?
Has data protection has become another casualty of the Coronavirus?
White-Box Encryption: Ending Web App Vulnerability
White-box cryptography is a solution that provides software-based key storage.
Keeping Your Backups Safe from Ransomware Attacks
If you don’t practice data backup hygiene, files could end up encrypted during the ransomware attack.
#HowTo Better Prevent Banking App Breaches
Banks need to go beyond relying on network and device security to protect their APIs, apps and customers’ private data.
Making Security a Team Sport is Critical to Identity Access Management Success
A framework to make IAM collaborative, determining stakeholders and making security everyone’s job.
Why You Should Stop Measuring Cybersecurity in Terms of Budget
There is a disconnect between how companies measure their cybersecurity readiness and achieving effective security in reality.
People, We Need to Talk About Mass Electronic Surveillance
The ethics of nationwide electronic surveillance databases related to #COVID19
How Useful Is MITRE's '25 Most Dangerous Software Errors' List?
As it is based on real-world data rather than anecdotal reports, the CWE Top 25 becomes a measure of what matters most.
Winning the War on Fraud During COVID-19
Securing this new geographically dispersed workforce and protecting every employee from fraud is the next major concern
Retaining Encryption Keys
Organizations need to both be able to secure their cryptographic keys away from the encrypted data and be able to manage and view them
Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security
With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective
Behind the Scenes of Dark Net Market Closures and Their Consequences
What happens behind the scenes of Dark Net market closures and how these sites are being replaced by smaller, specialized stores.
Networking in the Time of COVID-19
Innovations have shifted enterprise technology out of on-premise hardware and onto cloud-based platforms
The Role of Containerization to Protect Enterprise Cloud Ecosystems
The security posture of unmanaged endpoints is below that of the organization’s managed devices
Remote Working: How To Protect Your Employees’ Mental Health
Coping with everything that’s happening and the shift to working in isolation is proving rather difficult for many workers.
We Don’t Need More Cybersecurity, We Need Better Cybersecurity
Why are data breaches becoming more frequent and more costly?
Why You Want to Fail a Red Team Exercise
Why failing a Red Team exercise is good and what happens afterwards is more important.
The Do’s and Don’ts of Building a Cybersecurity Program
Pointers on the do’s and don’ts of building an effective security program.
Bad UX Design Always Leads to Compromised Security
When you make things with the user in mind, you create experiences that are free of frustrations