Infosecurity Opinions
Get Rid of your Database Security “Hairball” with Database Security 2.0
How SaaS, AI/machine learning, and unified database visibility play a critical role for achieving comprehensive security in today’s on-prem and multi-cloud database environments.
Protecting Private Data in Virtual Environments with New Encryption Approaches
New approaches for encryption protection in virtual environments.
Securing Against Developer Pressure
It is no longer acceptable to consider any connected software a finished product.
Strengthen Data Breach Defenses with Emulation Assessments
With data breach emulation, assessments are based on the use of actual attack components.
The Power of Quantum: Reshaping the Cybersecurity Landscape
Quantum computing promises medical breakthroughs, important scientific discoveries and key developments in manufacturing.
Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning
Penetration tests can fail before they even start, thanks to poor scoping.
Resolving the Tension between Hybrid/Multi-Cloud Settings and Greater Attack Surfaces
Beyond deperimeterization, on-premise, hybrid and multi-cloud use cases merely expands organizational attack surface
The Impact of AI on the Cybercrime Economy
The cyber-criminal community will adjust and accelerate their development effort using AI and machine learning technologies.
How to Integrate Business Security Systems
Is it better to buy a multi-functional suite with all the features or separate technology for the different areas you need to protect?
Passwordless Authentication is Finally on the Horizon
Will the new year continue a trend of passwordless authentication?
The Best Data Breach Tactics to Deploy Now
Two tactics to raise the bar of security to protect yourself and discourage attackers.
Fight Phishing with Benchmarking and Simulation Training
Benchmarking is an extremely valuable tool for figuring out how your organization is thwarting phishing attacks.
No Target is Too Small: Why SMEs Must be Cyber-Resilient
Smaller businesses are more vulnerable to cyber-attacks than enterprises, and so need to be more cybersecurity-savvy.
Guest Editor: A Passion for Cybersecurity
Cybersecurity is one of those careers that engenders real job satisfaction and passion amongst those working in the industry
#2018InReview Malware and Threats
A look back at the rocky road of 2018's threats, attacks and malware.
Guest Editor: Tackling the Growth of BEC Attacks
By addressing the problems of cybersecurity at the technical, physical and human level, we are putting ourselves in the best position to resist BEC
Guest Editor: Breaking the Barriers of Security
I have come to embrace that these barriers have helped shape the budding security professional I am today
#2018InReview Application Security and Software Development
2019 should be the year organizations look inward to make securing their own software and applications.
Guest Editor: Our Cyber Glass Ceiling
Our choice is very simple, we can either bemoan the status quo or identify an approach that allows us to articulate our business value in a quantifiable way
#2018InReview Compliance and GDPR
Looking at the year in compliance, the impact of GDPR and how much more the DPO needs to play a role in the business.