Infosecurity Opinions
A Trio of Approaches to Enhance Your NOC/SOC Collaboration
The lines between the NOC and SOC are breaking down
#HowTo Gain Visibility of Third Parties
Organizations should look to bring third parties in using tools that isolate or broker the connection
Removing Fear by Moving to Risk-Based Security Programs
Security teams do a poor job of prioritizing risk and sometimes do not even understand risk management
Counting on Quantitative Cyber Risk
The perceived importance of cyber risk has almost tripled in five years, but the expertise and technology has not kept pace
Defining KPIs for ISO 27001
Companies need strong cases for updating their equipment or acquiring new technology
Why Managed Service Providers Need to Help with Passwords
Bad password habits directly pose a threat to the defense of networks, devices and users
Why IT Security Hygiene is so Crucial for Financial Services Firms
Many IT and security leaders are juggling business priorities and their own internal security requirements
Is Shadow IT Really the Perilous Threat It's Made Out to Be?
It's difficult for administrators to secure what they don't know exists
Gearing up for an AI Revolution in Access Modelling
Think of a role as a label that we attach to an identifiable access pattern
My Voice is My Ultimate Password
How Biometrics Can Keep Hackers At Bay
Why Modern Identity Verification is Crucial in Today’s Threat Landscape
Multiple digital identity checks for remote verification will help increase pass rates
Staying on the Cutting Edge of Cybersecurity
With edge computing, the application and its data, are distributed across multiple locations
Next Generation Cyber: Malware-Free Attacks
The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective
System Hardening, and Why it’s Harder Than it Looks
The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings
Pandora’s Box Is Open – AI Won’t Get Back In
The unfolding AI vs AI cybersecurity war
The Case for Security Instrumentation: Understanding and Measuring Cyber Risk
So what can CIOs do to better understand and address these gaps
Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation
We in IT are often guilty of conflating information with wisdom
Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector
By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information
The Perils of Sneaking up the Supply Chain
Across the supply chain, partner security is a serious threat
Forever Day: The Threat that Never Ends
Even end-of-service-time equipment should get a patch if the company is able to provide it