Infosecurity Opinions
Zero to Hero: Securing Your Business with Zero Trust
How a business-driven approach addresses the challenges around the zero trust model
How Blockchain Addresses Public Key Infrastructure Shortcomings
How Blockchain could save or replace PKI
Europe’s Open Source Bug Bounty: A Wrong Start
Is Europe's bug bounty for open source projects a step forward or back?
Changing Threat Landscape Demands a New Paradigm of Cybersecurity
The threat landscape now includes bots, sophisticated attacks and vulnerable employees. Are you keeping up?
Super Systemic IoT Issues
Recognizing that they need to implement better security, IoT manufacturers are increasingly turning to third party providers
The Common Security Pitfalls of Network Modernization
What are the most common security pitfalls that can put SD-WAN deployments at risk?
Broadening the Search for Cybersecurity Heroes
As the cyber skills gap widens, recruiting new cyber talent is not the only solution
Why Knowing How Your Data Behaves is the Key to Cybersecurity
Gaining a real time insight into what’s happening with your data is critical, you need to learn what ‘good’ looks like
Breaking the (Kill) Chain: How to Protect Your Organizations Against Cyber Threats
Achieve a path through the cyber kill chain by understanding the anatomy of a cyber attack and strategies used by cyber-criminals.
Mitigating Merger and Acquisition Risks
Bringing together two organizations is rarely a straightforward task, and cybersecurity risks are often overlooked
Vulnerability Scans Are a Lot Like Eating Mushrooms
Vulnerability scanning is a security best practice dogged by compromises.
The Problem with Your Password? Everything.
When 100% of online fraud occurs after the user is authenticated, it's obvious that passwords are not doing the job.
Facial Recognition Technology: Don’t Throw the Baby Out with the Bathwater
The problem with facial recognition is not the technology itself but poor organizational processes, lax regulatory standards and inadequate oversight.
Why Modern Security Teams can no Longer Overlook Benefits of Orchestration
Once IT teams have orchestration technologies supporting security processes, they can make an active impact to the efficiency of employees
Addressing Inherent Risks in Code Repositories
Open source platforms enable cross-collaboration across development teams, however they also inadvertently introduce new security risks.
Getting Control of Security Controls
A focus on technology first, or an imbalanced control implementation, doesn’t necessarily lead to greater protection
A Level Playing Field for Threat Intelligence
The five priorities that every threat intelligence strategy should consider.
Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk
Regardless of what version of software you are on, there may be a zero-day that exists
Does Compliance Equal Security in the Age of Data Privacy?
Does compliance lead to security? That's the €20 million question.
The Journey to Data Integrity
How we can verify the authenticity of the things we see and hear, and what does this mean for data security?