Infosecurity Opinions
Another Data Privacy Law? No Problem
The New York Privacy Act will be added to a long list of worldwide regulations companies must comply with, or face harsh penalties
What is Malware Flux and How Can You Avoid it?
Malware flux "hides" malware in two waves of a Trojan
Establishing Efficient Data Governance Processes to Add Business Value
An effective strategy for data governance will help IT and security teams to articulate the value of such a program to the C-Suite
Is Continuous Authorization the New Frontier in Enterprise Security?
Authorization is no longer a nice-to-have feature, it is an imperative
Debunking Five Myths about Zero Trust
Zero Trust's evolution over the last decade have created some misconceptions
#HowTo Combat the Insider Threat
Insider threats can be difficult to detect, and pose a threat that businesses struggle to address
What is the Right Response to the Extended PSD2 Deadline?
Retailers have been granted an 18-month extension for SCA compliance, delaying implementation to March 2021
Why Content Services Platforms Should Be ‘Need-To-Know’ Security Ready
Need-to-know security is an essential part of protecting sensitive enterprise information
The CFO’s Perspective: Steps to Quantifying Cyber Risk
A CFO's steps to better security decisions
Attackers Will Get in, the Trick is to Kick Them Out ASAP
Despite increased investments, organizations are still suffering costly breaches
PSD2 - Why You Need to Get Used to the QWAC
QWAC standards are partly based on the CA/Browser Forum’s standard for Extended Validation certificates
#GartnerSEC: How to Keep Your Job After a Cyber-Attack
Overcoming these challenges will make an organization’s security program more defensible
Why Enclaves are Taking over the Security World
This has the potential to become the fundamental security building blocks for the enterprise
Crowdsourced Security is Redefining the Gig Economy, and Not in a Good Way
Why crowdsourced security is a race to the bottom
Keeping Data Secure in the Oil and Gas Industry
The smallest attack on this sector could result in devastating effects.
Establishing Identity in the Digital Economy
The rise of digital and mobile usage has increased the difficulty in verifying identity
What’s a Next Generation VPN with Zero-Trust Access?
SDPs have a big advantage over the VPNs of old
Why Focusing on Threat Hunting May Leave you Vulnerable
Uncovering poorly managed security solutions is a useful byproduct of threat hunting
Electron Framework Vulnerabilities - Shutting the Backdoor
The major flaw with Electron apps is they are greatly exposed due to a lack of integrity protection
Flexibility in Vulnerability Management: Why It’s Essential
Adopting flexible, automated vulnerability management tools will be essential