Infosecurity Opinions
Supply Chain Attacks: When Things Go Wrong
How supply chain attacks have leveraged the weakest links in security
Fast and Furious Phishing Attacks – The Race Against Time Matters
The race against time matters when defending against phishing attacks
Double Edged Sword of Secure Traffic
The positive and negative aspects of encrypted traffic
Homomorphic Encryption for Secure Elastic Data Stream Processing
How Fully Homomorphic Encryption can aid your cloud security
Debunking the Discourse Around Cloud Security
A widespread embrace of the cloud has brought benefits for collaboration and communication.
Why Third-Party Risk Assessment must be an Ongoing Process
As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk
The Changing Structure of Cybersecurity Teams
For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground
Robots vs False Positives: AI is Future Protection for Applications and APIs
Are the tools and processes we rely on leaving us vulnerable?
The Deal with Quantum Computing and Cryptography
Quantum computing continues to heat up as one of the major battlefields for security
Efficient Steps Toward a Successful PAM Implementation
How to ensure a successful privileged access management implementation
How Forgotten Legacy Systems Could Be Your Downfall
With end of support for Windows 7 announced for January, will we see more vulnerable networks?
Is your DDos Mitigation Strategy Terabit-Proof?
Larger and stronger DDoS attacks require a new approach to mitigate them
Explaining the Breakout Success of the NIST Cybersecurity Framework
The motivations and development that made the NIST Cybersecurity Framework a reality
Are Collaboration Tools Outpacing Security?
Collaboration tools are easy to use, but can be diametrically opposed to security by facilitating user behaviors that put organizations at risk
Overcoming Communication Barriers and Other Challenges
Apart from the operational issues, it is human nature and long-held attitudes that keep the businesses from being innovative and cybersec-focused
The e-state of Estonia – and its Lessons for Our Digital Future
How Estonia's example can lead on implementable authentication
Navigating Business Email Compromise Responses, From Data Mining to Notification
A new class of data breach vulnerability has been exposed due to hosted email
Risk-Based Security Scores that Matter to your Business
How can you correlate CVSS with the threats you face?
Identity-Defined Security is Critical in a Digital Transformation World
Digital transformation requires a different approach to IAM, optimizing people, process and technology
Don’t Overlook Geopolitics in Threat Intelligence
Geopolitically significant events impacting nation states often precede malicious cyber activity