Infosecurity Opinions
Keeping Data Secure in the Oil and Gas Industry
The smallest attack on this sector could result in devastating effects.
Establishing Identity in the Digital Economy
The rise of digital and mobile usage has increased the difficulty in verifying identity
What’s a Next Generation VPN with Zero-Trust Access?
SDPs have a big advantage over the VPNs of old
Why Focusing on Threat Hunting May Leave you Vulnerable
Uncovering poorly managed security solutions is a useful byproduct of threat hunting
Electron Framework Vulnerabilities - Shutting the Backdoor
The major flaw with Electron apps is they are greatly exposed due to a lack of integrity protection
Flexibility in Vulnerability Management: Why It’s Essential
Adopting flexible, automated vulnerability management tools will be essential
Universities Fall into the Cross Hairs of Cyber Attackers
Cyber attacks on higher education institutions are on the rise across the globe
Taking Data Security from Analogue to Digital
EU regulators now encourage companies to adopt a new “digital” alternative – namely “pseudonymisation”
Why the Security Industry Should Pay Attention to the Cisco Whistleblower Case
The Cisco whistleblower case has significant implications for the security industry
Complicated Compliance Made Easy
The increasing value of privacy technology to keep tabs on your data
Software-Defined Security Governance: The Market Shift
Every business today is truly a software business
The Benefits of Putting Security in Network Behavior Analytics
Machine learning and AI are making network monitoring a powerful new tool in the fight against cyber threats
A Trio of Approaches to Enhance Your NOC/SOC Collaboration
The lines between the NOC and SOC are breaking down
#HowTo Gain Visibility of Third Parties
Organizations should look to bring third parties in using tools that isolate or broker the connection
Removing Fear by Moving to Risk-Based Security Programs
Security teams do a poor job of prioritizing risk and sometimes do not even understand risk management
Counting on Quantitative Cyber Risk
The perceived importance of cyber risk has almost tripled in five years, but the expertise and technology has not kept pace
Defining KPIs for ISO 27001
Companies need strong cases for updating their equipment or acquiring new technology
Why Managed Service Providers Need to Help with Passwords
Bad password habits directly pose a threat to the defense of networks, devices and users
Why IT Security Hygiene is so Crucial for Financial Services Firms
Many IT and security leaders are juggling business priorities and their own internal security requirements
Is Shadow IT Really the Perilous Threat It's Made Out to Be?
It's difficult for administrators to secure what they don't know exists