Infosecurity Opinions
Excessive Access is a Threat to Mainframe Security – Is Your Company at Risk?
Excessive access is usually uneccessary, how can you better manage it?
Keeping the .UK Internet Secure For All
2019 will see third-level. UK domains face the decision of taking up the second-level equivalent
What is Wrong with IoT Security Today?
Many organizations are using Public Key Infrastructure (PKI), but doing so without thinking beyond the next couple of years
HIPAA Compliance in the Cloud: Who’s Responsible?
Cloud compliance is important, although it does not have to be complicated
Forgotten, But Not Gone: The Security Risk of Legacy Apps
Legacy apps are a part of any company’s growth story, whether an organization grows organically or through M&A
A US State of Readiness?
Does the US need its own version of GDPR?
Can Your Data Be Held Hostage?
How do you know if your data is held hostage, or altered without your knowledge?
The Insider Threat - the Top Security Issue of 2019?
The insider threat should be addressed in a systematic manner, with policies applied both internally and to your assessments of outside services.
How Modern Web Applications Changed the Way Enterprises Should Handle Security
APIs have proliferated across application environments to allow access to a much broader range of users
The Benefits to Hiring a Diverse Cyber Team
A rich pool of experience and backgrounds encourages diversity of thought and new perspectives
Are Shadow Cloud Services Undermining Your Security Efforts?
Most enterprises have dozens of “shadow cloud” applications in use that introduce risk because they weren’t planned
Most Businesses Overlook One Common Mainframe Security Vulnerability
Functions provided by mainframes are some of the most visible and customer-centric aspects of your technology
Zero to Hero: Securing Your Business with Zero Trust
How a business-driven approach addresses the challenges around the zero trust model
How Blockchain Addresses Public Key Infrastructure Shortcomings
How Blockchain could save or replace PKI
Europe’s Open Source Bug Bounty: A Wrong Start
Is Europe's bug bounty for open source projects a step forward or back?
Changing Threat Landscape Demands a New Paradigm of Cybersecurity
The threat landscape now includes bots, sophisticated attacks and vulnerable employees. Are you keeping up?
Super Systemic IoT Issues
Recognizing that they need to implement better security, IoT manufacturers are increasingly turning to third party providers
The Common Security Pitfalls of Network Modernization
What are the most common security pitfalls that can put SD-WAN deployments at risk?
Broadening the Search for Cybersecurity Heroes
As the cyber skills gap widens, recruiting new cyber talent is not the only solution
Why Knowing How Your Data Behaves is the Key to Cybersecurity
Gaining a real time insight into what’s happening with your data is critical, you need to learn what ‘good’ looks like