Infosecurity Opinions
Cybersecurity – It Takes an Engineer to Catch an Engineer
How to use cyber-criminal behavior pattern knowledge to our advantage
The Most Influential Security Frameworks of All Time
Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures
Safety and Security in Industry 4.0 – Are You Ready?
A fundamental challenge remains about how advances should be secured
The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust
The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior
Constant Visibility is Crucial to Enterprise Mobile Security
Enterprise IT or security teams have almost zero visibility when it comes to mobile devices
Performance Anxiety and the Inability to Stop Access Threats
The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago
Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success
With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data
Why the Real Estate Industry is a Prime Target for Attackers
Why are cyber-criminals so heavily targeting the real estate market?
Why Network Visibility is at the Heart of Digital Transformation
To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution
Governing Over Critical Data in the Internet of Things
What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?
The Three Hidden Dangers of Working With Third-Party Vendors
We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes
The Security Nightmare of Formjacking
Staying ahead of trends and the security game, hackers have latched onto another high-return attack
#HowTo Vet AI Threat Detection Solutions for Stronger Cybersecurity
A behavioral analytics-based approach looks at motives rather than tactics
The Role of Data in Managing Application Risk
Risk assessment and vulnerability reporting presents the first significant data management challenge faced by appsec programs
The Five Pillars of Actionable Cloud Security
Designing and deploying an actionable cloud security framework that follows industry best practices (in sequence) gives companies the best chance for success.
#HowTo Enable Effective Security Awareness Training
Steps to take to enable efficient security awareness
Protecting Service Revenue from Hackers: Cybersecurity for Connected Maintenance Apps
Modern maintenance apps provide on-site history, diagnostics, performance measurement and tunability of systems
Apps: Gateway to Your Private Data
For companies that store personal data, there is a hefty burden of responsibility.
What Should Frighten us about AI-Based Malware?
AI machine learning (ML) security powered by algorithms was intended to defeat cyber doom and gloom
The Brexit Threat: Chaos, Confusion and Con Men
Confusion brought about by Brexit is opening up more opportunities for cyber-criminals