Infosecurity Opinions
Avoiding Security Certificate Missteps
Digital certificates and signatures offer a foundational layer of trust to reinforce corporate IT security strategy
Stop the Noise, Time to Rationalize Cybersecurity
Security managers moving away from buying solutions and focus on consolidation and simplification of security stacks
The Rise of Stegware
The rise of “Stegware": more evidence threats are getting stealthier and the need for visibility is rising
API Security Vulnerabilities: A Crack in the Foundation of Digital Business
A Digital Business Foundation Built on APIs
Preparing for the California Consumer Privacy Act: Avoid the Landmines & Learn from GDPR
Looking forward to the CCPA, and what impact GDPR has had upon it
Securing a Country’s Crucial Networks
Safeguarding the public sector from cyber-attacks is a key responsibility of our country’s government
Effective Risk Analysis in Cybersecurity, Operational Technology and the Supply Chain
Whether in cybersecurity, operational technology, or supply chain domains, problems emerge when you assess and manage risk with quantitative analysis.
Leveraging the Biometrics Ecosystem to Improve Cybersecurity
To properly leverage biometrics, you should understand elements that make it a powerful tool
Failing to Accept Human Nature Makes for Shoddy Cybersecurity
In the worst instances, unwittingly falling victim to a piece of malware could cost you your job
The Value of Predictive Email Security
Threat prediction can help businesses use data to prepare for what the next attack will look like
Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do
Achieving risk management goals will not improve your risk posture
Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet
By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm
Before Blaming Hackers, Check Your Configurations
Default SaaS settings often weigh easy access and usability over better security.
Tactics to Go Fully Secure in the Cloud
The best ways to beef up cloud security posture and set yourself up for success
Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations
Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process
Actions After you Find the Network Anomaly
Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning
Months After the US Government Shutdown, Cybersecurity is Still Suffering
Four months on from the US Government shutdown, employees are scrambling to catch up with security admin
An Incident Response Walkthrough - Why is Process so Important?
How unusual activity on a laptop turned into a lesson on incident response
Reduce Security Complexity for Cloud Architectures
Threats that target public clouds require a different type of insight and action
Can You Trust Your AI?
Evaluating Machine Learning algorithms in practice