Infosecurity Opinions
Navigating Business Email Compromise Responses, From Data Mining to Notification
A new class of data breach vulnerability has been exposed due to hosted email
Risk-Based Security Scores that Matter to your Business
How can you correlate CVSS with the threats you face?
Identity-Defined Security is Critical in a Digital Transformation World
Digital transformation requires a different approach to IAM, optimizing people, process and technology
Don’t Overlook Geopolitics in Threat Intelligence
Geopolitically significant events impacting nation states often precede malicious cyber activity
The Time to Implement a New Cybersecurity Playbook is Now
How Q1's trends can shape 2019's playbook
Boosting Corporate Security with the Intrusion Kill Chain
How the intrusion kill chain can keep you ahead of adversaries.
Security by Design – Trust in the Intelligent Cloud
How to formulate a successful collaboration strategy and planning a robust cloud security posture
Manufacturing Cybersecurity - the Brexit Lookout
Will Brexit leave British industry at the mercy of cyber attackers?
Excessive Access is a Threat to Mainframe Security – Is Your Company at Risk?
Excessive access is usually uneccessary, how can you better manage it?
Keeping the .UK Internet Secure For All
2019 will see third-level. UK domains face the decision of taking up the second-level equivalent
What is Wrong with IoT Security Today?
Many organizations are using Public Key Infrastructure (PKI), but doing so without thinking beyond the next couple of years
HIPAA Compliance in the Cloud: Who’s Responsible?
Cloud compliance is important, although it does not have to be complicated
Forgotten, But Not Gone: The Security Risk of Legacy Apps
Legacy apps are a part of any company’s growth story, whether an organization grows organically or through M&A
A US State of Readiness?
Does the US need its own version of GDPR?
Can Your Data Be Held Hostage?
How do you know if your data is held hostage, or altered without your knowledge?
The Insider Threat - the Top Security Issue of 2019?
The insider threat should be addressed in a systematic manner, with policies applied both internally and to your assessments of outside services.
How Modern Web Applications Changed the Way Enterprises Should Handle Security
APIs have proliferated across application environments to allow access to a much broader range of users
The Benefits to Hiring a Diverse Cyber Team
A rich pool of experience and backgrounds encourages diversity of thought and new perspectives
Are Shadow Cloud Services Undermining Your Security Efforts?
Most enterprises have dozens of “shadow cloud” applications in use that introduce risk because they weren’t planned
Most Businesses Overlook One Common Mainframe Security Vulnerability
Functions provided by mainframes are some of the most visible and customer-centric aspects of your technology