Infosecurity Opinions
#HowTo Put Together an Effective Information Security Policy
Do not think that anything is too obvious to leave out of your policy
Cybersecurity Must Do More Than Prevention, Real-Time Metadata Is the First Step
Rich metadata gathered from your network can capture more than 90% of the useful data that a full packet capture system would.
Using Graph Search Engines and High Performance Servers to Find Malware Patterns
Threat detection tools face formidable challenges, particularly when analyzing massive data sets
What the Post-API Economy Will Look Like
APIs are beginning to struggle with capacity and security issues
Consumer Apps: the New-Age Weapon
A mobile-centric zero trust approach also provides on-device detection and remediation of threats.
Rely on Continuous Improvement and Not Biases to Apply Cybersecurity Best Practices
How do we learn from our mistakes instead of continually repeating them?
A Digital Solution to Supply Chain Security
Why businesses should secure and manage third party access points by digitizing identity
Real ID Driver License Push Could Mean Real Headaches for US State Agencies
Real ID is one of the biggest data-gathering initiatives to take place recently
Software Security Witching Hour is Upon us
Which vulnerabilities are lurking in the shadows?
Effective Encryption Protects Data When it's Most Vulnerable
Remember that data exists in essentially three states: at-rest, in-motion, and in-use
How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?
More and more enterprises are relying on third-party service providers
#HowTo Avoid Common Mistakes in Vulnerability Management
A successful vulnerability management program is all about the reduction of business risk
The Hunt for Effective Machine Learning in Security
The vast majority of today’s breaches root back to a failure of detection
Curbing Insider Insecurity
Cyber-criminals often weaponize ignorance in their attacks
Cloud Migration Makes an Old Data Security Problem New Again
The current push toward digital transformation can only exacerbate the problem
Fighting Fraud: Connecting the Dots with Data
Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor
SOC 1, 2, & 3 Audit Reports, and Why You Need One
A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work
Managing Non-Security Incidents with Security Tools and Policies
What happens when an incident isn’t security related?
Equifax and Capital One: What Should We Learn?
Both were possible because of basic holes in the companies’ cyber hygiene practices
How Secure Is Behavioral Biometrics?
Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics