Infosecurity Opinions
Real ID Driver License Push Could Mean Real Headaches for US State Agencies
Real ID is one of the biggest data-gathering initiatives to take place recently
Software Security Witching Hour is Upon us
Which vulnerabilities are lurking in the shadows?
Effective Encryption Protects Data When it's Most Vulnerable
Remember that data exists in essentially three states: at-rest, in-motion, and in-use
How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?
More and more enterprises are relying on third-party service providers
#HowTo Avoid Common Mistakes in Vulnerability Management
A successful vulnerability management program is all about the reduction of business risk
The Hunt for Effective Machine Learning in Security
The vast majority of today’s breaches root back to a failure of detection
Curbing Insider Insecurity
Cyber-criminals often weaponize ignorance in their attacks
Cloud Migration Makes an Old Data Security Problem New Again
The current push toward digital transformation can only exacerbate the problem
Fighting Fraud: Connecting the Dots with Data
Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor
SOC 1, 2, & 3 Audit Reports, and Why You Need One
A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work
Managing Non-Security Incidents with Security Tools and Policies
What happens when an incident isn’t security related?
Equifax and Capital One: What Should We Learn?
Both were possible because of basic holes in the companies’ cyber hygiene practices
How Secure Is Behavioral Biometrics?
Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics
Defending in the Age of Advanced Insiders
Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack
Application Security Report: Urgent Need for Remediation
Remediation rates for security flaws have been gradually declining
We’ve Been Breached! What Do You Want From Us?
While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget
#HowTo Develop a Detection and Response Strategy for Email Phishing
You need to get your employees on board to help prevent phishing
Why Understanding the User Experience is Essential to Good Security
Security and usability have traditionally been opposing concepts.
Bots x Humans: a Solution is Needed
Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer
Your Employees are Taking Your Data
Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors