Infosecurity Opinions
Business as (un)usual: Communicating During a Pandemic, and Beyond
A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon
#HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering
Social engineering is also a matter of thinking out of the box
How the MSSPs Can Strive to be Detection Ninjas
An MSSP engineers for both situational awareness and situational consistency.
The Bigger Perimeter Picture of #COVID19
Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model
Reinventing the Role of the Tier 1 SOC Analyst
Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts
What Actually IS a Cyber Range, and How Has It Evolved?
A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how
Automating Security With Intelligence
Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.
Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments
Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.
Preparing for Tomorrow: Cybersecurity in a Remote World
The cost effective option of permanent remote working
Is a Wiped Computer Truly Wiped?
Just because data appears to be gone doesn’t mean that it really is
Why SASE Can be Your Solution in a Time of Uncertainty
With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption
The Key to Successfully Managing Cyber Risk: Speed
No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.
RE: Thinking Email Security
Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed
The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives
Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance
Lessons From the World’s Crash-Course into Telecommuting During #COVID19
A few weeks into the Covid-19 disruptions, some first-hand observations from the field that apply to organizations globally
Zelle: A New Door Opens, But is Crime Walking In?
Zelle fraud is the fastest growing area of account takeover fraud in the U.S. banking sector.
#HowTo Secure Distributed Cloud Systems in Enterprise Environments
How can organizations secure distributed cloud systems while maintaining efficiency?
Steps to Implementing Voice Authentication and Securing Biometric Data
What are the steps to implementing a voice verification system, and how should the voiceprint data be secured?
Debunking Myths about Quantum Cryptography
Given how much data is stolen from U.S. industry and government, quantum could be a huge problem.
Top Ways to Guard Against Work-from-Home Phishing Threats
Best practices that can help raise awareness of potential phishing techniques and other scams