Infosecurity Opinions
How Social Engineering is Changing the Insider Threat Game
Social engineering attacks ultimately lead to a type of insider threat known as user error
#HowTo Get the Most Out of Your Privileged Access Management Programme
Enterprises should put thought into architecting a PAM program with a risk-based approach
Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?
An advance on traditional segmentation that marries speed, innovation and improved security.
Is it Time to Resuscitate Prevention?
Why data breaches are only inevitable if we continue to think of them as the new normal.
Providing Cyber Defence Without Breaking The Bank
An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory
Collaborative Approaches to Security – Getting DevSecOps to Work
Continuous intelligence data can help make DevSecOps a reality
When Malware Returns: Beating the Silent System Killer
More than half of ransomware victims got hit a second (or more) time
Windows 7 is Ending -- Don't Put Yourself at Risk
With only two months until the end of life date, waiting to address the issue will only increase the risk to your business
Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists
Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea
Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.
SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security
Unfortunately, many SaaS providers enable SSO only for “enterprise” customers
CISO - Don't Take it Personally But Make it Personal
You need a lot more than technical knowledge and the ability to design roadmaps and execute projects
Address New Risks Without Adding Complexity
There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise
Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You
The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs
Managed Security Services Shouldn’t Scare the SMB
The MSSP model is now in financial reach for the SMB
Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?
Is anti-virus facing the same future as the Okjökull glacier
Extending the “Circle of Trust” with Confidential Computing
When an application starts to run, its data is vulnerable to a variety of attacks
How AI is Revolutionizing the Banking Sector
AI is becoming important for all businesses that rely heavily on data
#HowTo Migrate from SharePoint
Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system