Infosecurity Opinions
Is TikTok a Cybersecurity Threat?
There are concerns about TikTok, so what can we do about them?
Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains
Attackers are increasingly looking to target people while they are travelling
Why Businesses Need to Re-Think Network Monitoring in 2020
The current approach to network security is significantly flawed on two counts
What Does the Hack Back Bill Mean to Your Business?
There is often vagueness in the language of new bills, especially when they are still in draft form.
How the Real Business Killer is Having Nothing on the Shelves
While ransomware is certainly a current problem for targeted businesses, downtime is a seasoned business killer
Call in the White Hats — It’s Time to Reboot External Testing
Businesses should be cycling through new testers every so often, so that attackers can push at different doors.
How Social Engineering is Changing the Insider Threat Game
Social engineering attacks ultimately lead to a type of insider threat known as user error
#HowTo Get the Most Out of Your Privileged Access Management Programme
Enterprises should put thought into architecting a PAM program with a risk-based approach
Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?
An advance on traditional segmentation that marries speed, innovation and improved security.
Is it Time to Resuscitate Prevention?
Why data breaches are only inevitable if we continue to think of them as the new normal.
Providing Cyber Defence Without Breaking The Bank
An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory
Collaborative Approaches to Security – Getting DevSecOps to Work
Continuous intelligence data can help make DevSecOps a reality
When Malware Returns: Beating the Silent System Killer
More than half of ransomware victims got hit a second (or more) time
Windows 7 is Ending -- Don't Put Yourself at Risk
With only two months until the end of life date, waiting to address the issue will only increase the risk to your business
Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists
Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea
Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.
SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security
Unfortunately, many SaaS providers enable SSO only for “enterprise” customers
CISO - Don't Take it Personally But Make it Personal
You need a lot more than technical knowledge and the ability to design roadmaps and execute projects
Address New Risks Without Adding Complexity
There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise