Infosecurity Opinions
Educating Non-Technical Employees on the Risks Of Shadow IT
Shadow IT is becoming more of a prevalent risk for a few reasons
Ransomware is Putting Smart City Aspirations on Notice
Current cybersecurity solutions are not able to cost-effectively scale in order to fully monitor the burgeoning networks.
Insecure Loyalty Points are the Dark Web’s New Currency
Businesses need to treat their loyalty point schemes more like bank accounts
A Risky Misconception – Understanding Supplier Risk Profiles
We’ve identified 5 steps to help companies mitigate the risk caused by outside suppliers.
Pros and Cons of Multi-Model DBs to Store Threat Intelligence Data
The pros and cons of storing STIX data in relational databases
Why DPAs Need Deeper Attention
Why we need to pay more attention to data processing agreements
Is the CCPA the Beginning of a Move to Supra-National Legislation?
In light of the General Data Protection Regulation and the California Consumer Privacy Act, is this the beginning of a move to supra-national legislation?
Which Issues Can DataOps Solve?
This means incorporating DevOps and data management staff into a collaborative team.
#HowTo Do DevOps Effectively
DevOps is a practice that aims at merging quality assurance, development, and operations
Defending Against State-Sponsored Hackers
No one is safe, and professionals need to think about their risk management strategy
Is Anyone Paying Attention to Healthcare Security?
How much worse does it need to get for us to begin acting responsibly?
Why Leaky Clouds Lead to Data Breaches
We’re bound to see more of these breaches in the future even though they’re easy to avoid
2020 – An Opportunity in Counterintelligence and Deception
Deception helps address the two primary barriers to breach protection
Managing the Public Cloud in 2020
The public cloud is crucial for modern organizations looking to digitally transform their business, yet security in that area remains a hurdle
Are You Prepared to Battle Account Takeover Fraud?
Security measures that will help you assess your capacity to battle account takeover fraud.
Common Cloud, Container and Control Mistakes to Avoid in 2020
Three common – and critical – mistakes made by CISOs and CSOs.
Why Private DNA Testing is a Threat to Our Privacy
Existing regulations are not enough to fully protect a person’s genetic data
With Third-Party Providers, Trust is in Short Supply
Innovation, therefore, increasingly necessitates outsourcing.
The Five States of Compliance Maturity: Building a Strong Training Strategy
A comprehensive training strategy can result in major, long-term dividends.
#HowTo Deal with Apple Ransomware
In contrast to a widespread misconception, Mac computers are susceptible to ransomware and other types of predatory code