Infosecurity Opinions
Are You Prepared to Battle Account Takeover Fraud?
Security measures that will help you assess your capacity to battle account takeover fraud.
Common Cloud, Container and Control Mistakes to Avoid in 2020
Three common – and critical – mistakes made by CISOs and CSOs.
Why Private DNA Testing is a Threat to Our Privacy
Existing regulations are not enough to fully protect a person’s genetic data
With Third-Party Providers, Trust is in Short Supply
Innovation, therefore, increasingly necessitates outsourcing.
The Five States of Compliance Maturity: Building a Strong Training Strategy
A comprehensive training strategy can result in major, long-term dividends.
#HowTo Deal with Apple Ransomware
In contrast to a widespread misconception, Mac computers are susceptible to ransomware and other types of predatory code
Code Signing: How to Respond to the Hidden Threat
How do you know the code you’re using can be trusted?
Weaponized Data Breaches: Fueling a Global Cyber Cold War
Escalating geo-political tensions are intensifying the global cyber cold war with no end in sight
New Year, New Operating System
The truth is migrating to a new operating system can be a pain
Options to End the End to End Encryption Debate
The debate has been framed as being between privacy and security
How eLearning Can Increase Company Cybersecurity Across the Board
Its better to be proactive rather than reactive
The Risk of Increase in Social Cyber Security in 2020
One way social proof can drive positive cybersecurity behaviors is by highlighting the right that others are doing.
DevOps and Security – What’s in a Name?
By looking at a DevOps Security approach rather than DevSecOps, security teams can use their influence and experience to their advantage
Preparing Your Enterprise For a Post-Quantum Future
There is no easy way to know if you are behind the curve, on schedule, or moving too slowly
Knowing Your Enemy: Attack Attribution in Cybersecurity
While you can’t predict all attacks, you can use intelligence from the past to mitigate
Do We Need More Cyber Hygiene?
Judging from the continued news of breaches, do we ever have enough cyber hygiene?
#HowTo Do SD-WAN Security
Arguably SD-WAN’s greatest benefit is identifying and closing holes in an enterprise’s security.
Life as a Crowdsourced Hacker – Why You Won’t Become a Millionaire
It’s important to understand what you’re in for
Is This the Beginning of the End for Transport Layer Security Inspection Techniques?
The NSA makes it clear that TLSI does have advantages
Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand
Brands are unaware of who fourth parties are, and damage control becomes more challenging