Infosecurity Opinions
The Five Pillars of Actionable Cloud Security
Designing and deploying an actionable cloud security framework that follows industry best practices (in sequence) gives companies the best chance for success.
#HowTo Enable Effective Security Awareness Training
Steps to take to enable efficient security awareness
Protecting Service Revenue from Hackers: Cybersecurity for Connected Maintenance Apps
Modern maintenance apps provide on-site history, diagnostics, performance measurement and tunability of systems
Apps: Gateway to Your Private Data
For companies that store personal data, there is a hefty burden of responsibility.
What Should Frighten us about AI-Based Malware?
AI machine learning (ML) security powered by algorithms was intended to defeat cyber doom and gloom
The Brexit Threat: Chaos, Confusion and Con Men
Confusion brought about by Brexit is opening up more opportunities for cyber-criminals
Vendors Need to Stop Fear Selling, it’s Damaging the Whole Industry
FUD selling is frustrating, unhelpful and damaging
Cybersecurity: Lessons from Israel
Israel’s current set up continues to create a constant stream of talented cybersecurity operatives
Why a Flash-To-Cloud Approach Will Be the Last Protection Standing in the IoT
An innovative approach to IoT security is to protect the device’s flash, even from the processor and the software that is running on it
Password Spraying Fells Citrix. Are We Next?
The Citrix breach could turn out to be one of the most important in recent years
Avoiding Security Certificate Missteps
Digital certificates and signatures offer a foundational layer of trust to reinforce corporate IT security strategy
Stop the Noise, Time to Rationalize Cybersecurity
Security managers moving away from buying solutions and focus on consolidation and simplification of security stacks
The Rise of Stegware
The rise of “Stegware": more evidence threats are getting stealthier and the need for visibility is rising
API Security Vulnerabilities: A Crack in the Foundation of Digital Business
A Digital Business Foundation Built on APIs
Preparing for the California Consumer Privacy Act: Avoid the Landmines & Learn from GDPR
Looking forward to the CCPA, and what impact GDPR has had upon it
Securing a Country’s Crucial Networks
Safeguarding the public sector from cyber-attacks is a key responsibility of our country’s government
Effective Risk Analysis in Cybersecurity, Operational Technology and the Supply Chain
Whether in cybersecurity, operational technology, or supply chain domains, problems emerge when you assess and manage risk with quantitative analysis.
Leveraging the Biometrics Ecosystem to Improve Cybersecurity
To properly leverage biometrics, you should understand elements that make it a powerful tool
Failing to Accept Human Nature Makes for Shoddy Cybersecurity
In the worst instances, unwittingly falling victim to a piece of malware could cost you your job
The Value of Predictive Email Security
Threat prediction can help businesses use data to prepare for what the next attack will look like