Infosecurity Opinions
Overconfidence and Under Education – Can Enterprises Ever be Secure?
Security professionals must get data management right, as a single mistake is all it takes to permanently affect brand equity
COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?
Amid national lockdowns and growing fear, governments are looking towards curbing the spread of the virus with unconventional means
If You’re in IT, Never Forget That You’re Also a Risk Manager
Every information technologist, whatever their specialty or skill set, is a risk manager.
Operationalizing NSA Guidance (or any Guidance, For That Matter!)
How does one operationalize guidance from the NSA and other elite security organizations?
Uncovering and Outlining Best Practices for Container Security
Best practices for container security, and secure approaches when it comes to control, visibility, monitoring, and configuration.
How Close Will We Get to an Autonomous SOC in the Next Decade?
This is what threat actors are counting on – amidst all this noise, their attempted incursion will be missed
How Are Digital Natives Shaping the Future of Data Privacy?
Digital natives have chosen to embrace technology as a permanent constituent of their way of life.
Respecting Data Privacy Rights Through Data Encryption
Data privacy must be a top priority for all organizations
Guarding Your Enterprise Cloud Phone System Against Cyber Attacks
You can only enjoy all the benefits of IP telephony if you have a strong defense system in place
Closing the Regulatory Loophole: Third Party Breach Notification
Ignoring third-party notifications of data breaches is a big problem for the breached company.
The Mobile Underworld: How Businesses Are Attacked in Murky Parts of the Mobile App Ecosystem
How attackers can imitate your company with a rogue mobile app
Why Automation Holds the Key to Security Governance and a Culture of Collaboration
How automation can help to unify security operations and open a dialogue with IT and other business stakeholders.
#HowTo Reduce Your Ransomware Attack Surface
How can your organization significantly improve its chances at surviving a potential ransomware attack?
Working from Home Policies and the Future of Cybersecurity
The COVID-19 epidemic has re-enforced that the future of cybersecurity is in the cloud
A Cybersecurity Culture Score
Looking at the Business Model for Information Security, a way of thinking about information security in a holistic way.
The Future for Network Security: What Does SASE Bring to the Table?
As part of an overall digital business transformation, organizations will look to SASE
Keeping Data Secure in the Always-On World
Despite the proliferation of sophisticated cyber breaches, always-on availability is a consideration many IT leaders are not prioritizing
Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough
The most frustrating part of Wawa’s story? That it could’ve been prevented
A First-Class Feature: Security in the Era of Worker Data
As industries adopt data-rich wearable technologies, it’s imperative that security be prioritized as a first-class feature.
Push Security to the Edge: Overcoming Edge Computing Challenges
The best attacks are the ones you never see coming