Infosecurity Opinions
Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists
Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea
Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.
SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security
Unfortunately, many SaaS providers enable SSO only for “enterprise” customers
CISO - Don't Take it Personally But Make it Personal
You need a lot more than technical knowledge and the ability to design roadmaps and execute projects
Address New Risks Without Adding Complexity
There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise
Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You
The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs
Managed Security Services Shouldn’t Scare the SMB
The MSSP model is now in financial reach for the SMB
Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?
Is anti-virus facing the same future as the Okjökull glacier
Extending the “Circle of Trust” with Confidential Computing
When an application starts to run, its data is vulnerable to a variety of attacks
How AI is Revolutionizing the Banking Sector
AI is becoming important for all businesses that rely heavily on data
#HowTo Migrate from SharePoint
Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system
Demand More Achievement in Cybersecurity
We need automated measures of effectiveness relative to operationalized cybersecurity
Why Password-based Single Sign-On is a Bad Idea
It all comes down to trust.
The Internet Is Growing, and so Is Your Attack Surface
A company’s attack surface sprawls across the open internet, making attack surface management a critical component
The Three Cyber Attacks Ruining Your Holiday Spirit
Three types of cyber attack to watch out for during the holiday season
Calculating the True Cost of a SOC
Under-staffed IT and security teams can create more security risk than most companies realize.
Expanding Biometric Use in Government
Biometrics, similar to passwords, PINs and bankcards, are a credential
Illuminate Dark Data and Avoid Severe Security Risks
Nearly 90% of all data is dark, meaning it’s sitting unused by the organizations that collect it.
A Tricky Transition: Why Organizations Struggle with Secure, Multi-Cloud Migrations
On average, they are leveraging nearly five clouds.