Infosecurity Opinions
Demand More Achievement in Cybersecurity
We need automated measures of effectiveness relative to operationalized cybersecurity
Why Password-based Single Sign-On is a Bad Idea
It all comes down to trust.
The Internet Is Growing, and so Is Your Attack Surface
A company’s attack surface sprawls across the open internet, making attack surface management a critical component
The Three Cyber Attacks Ruining Your Holiday Spirit
Three types of cyber attack to watch out for during the holiday season
Calculating the True Cost of a SOC
Under-staffed IT and security teams can create more security risk than most companies realize.
Expanding Biometric Use in Government
Biometrics, similar to passwords, PINs and bankcards, are a credential
Illuminate Dark Data and Avoid Severe Security Risks
Nearly 90% of all data is dark, meaning it’s sitting unused by the organizations that collect it.
A Tricky Transition: Why Organizations Struggle with Secure, Multi-Cloud Migrations
On average, they are leveraging nearly five clouds.
Identifying and Defending Against Harmful Content
‘Not Safe For Work’ content is a more prevalent and complex issue than ever before.
Risk in Retail: Staying on the Right Side of the Headlines
How can retailers survive in a connected and risky world?
A Familiar Foe — Preventing Ransomware’s Resurgence
For hackers able to identify and infiltrate systems that are lagging behind, however, the payday is still high
Addressing the C-suite Access Issue
The higher up the individual, the bigger the risk
#HowTo Have Better Open Source Security for the Financial Services Sector
How financial services organizations can use more open source code risk-free
Winning the Cybersecurity Battle with Open Networking
The best defense policy is one that is pre-emptively implemented before any attack
Why I Don't Blame Boards for Underinvesting in Cybersecurity
Security professionals need to present boards with something much more arresting: metrics and indicators
We’re Going to Need a Better Plan
Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.
Combining Threat Playbooks with AI to Stop Cyber-Criminals
Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence
A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth
Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.
Proactively Protecting Sensitive Data
Traditional cybersecurity defenses are insufficient, as the steady stream of data breaches indicates
Building a Cyber Risk Report Your Board Will Love
Cyber risk has emerged as one of the top risks to the enterprise so CISOs are being asked to report more frequently to the board