Infosecurity Opinions
Mal-Innovation on Mobile: A Changing Threat Landscape
When it comes to enterprise mobile security, innovation is the biggest hurdle to overcome
Making Security a Business Priority: Four Things to Communicate to Leadership
Four talking points IT teams can better communicate to avoid a catastrophic cyber incident before it’s too late
Will COVID-19 be the Catalyst to Finally Replace Passwords With Biometrics?
Could Coronavirus be the catalyst that pushes us to swap out passwords for more secure and private authentication protocols?
How Bots Can Attack Your Web Application – And How To Stop Them
A new focus on sophisticated bots is emerging and how to spot real users from imposters
Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners
Zero Trust Application Access can literally be a game changer for organizations
Viruses Still Spread, Get Ready for Containment
It’s essential that management be capable of immediate containment, isolation and eradication of these threats.
AI and Data Privacy: Compatible, or at Odds?
How do we leverage the best of what AI has to offer without compromising data privacy?
Data Protection – Another COVID-19 Casualty?
Has data protection has become another casualty of the Coronavirus?
White-Box Encryption: Ending Web App Vulnerability
White-box cryptography is a solution that provides software-based key storage.
Keeping Your Backups Safe from Ransomware Attacks
If you don’t practice data backup hygiene, files could end up encrypted during the ransomware attack.
#HowTo Better Prevent Banking App Breaches
Banks need to go beyond relying on network and device security to protect their APIs, apps and customers’ private data.
Making Security a Team Sport is Critical to Identity Access Management Success
A framework to make IAM collaborative, determining stakeholders and making security everyone’s job.
Why You Should Stop Measuring Cybersecurity in Terms of Budget
There is a disconnect between how companies measure their cybersecurity readiness and achieving effective security in reality.
People, We Need to Talk About Mass Electronic Surveillance
The ethics of nationwide electronic surveillance databases related to #COVID19
How Useful Is MITRE's '25 Most Dangerous Software Errors' List?
As it is based on real-world data rather than anecdotal reports, the CWE Top 25 becomes a measure of what matters most.
Winning the War on Fraud During COVID-19
Securing this new geographically dispersed workforce and protecting every employee from fraud is the next major concern
Retaining Encryption Keys
Organizations need to both be able to secure their cryptographic keys away from the encrypted data and be able to manage and view them
Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security
With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective
Behind the Scenes of Dark Net Market Closures and Their Consequences
What happens behind the scenes of Dark Net market closures and how these sites are being replaced by smaller, specialized stores.
Networking in the Time of COVID-19
Innovations have shifted enterprise technology out of on-premise hardware and onto cloud-based platforms