Infosecurity Opinions
Why You Should Implement Privacy by Design Before GDPR’s First Birthday
How do you achieve privacy by design when the GDPR is unspecific on how to do it?
Making the Case for Cybersecurity Investment
Business leaders are yet to fully embrace the value of cybersecurity.
Unraveling the Quandary of Access Layer versus Storage Layer Security
How to ensure security and data access which is flexible enough for regulatory compliance.
Hacking Video Conferencing Platforms - The Next Big Thing?
Has society realized the vulnerability dangers within video calling and conferencing technologies.
Converged OT/IT Networks Introduce New Security Risks
At the core of the “Industry 4.0” trend, is the convergence of operations technology (OT) and information technology (IT) networks.
Dark Net Recruitment is Turning Employees into Malicious Insiders For-Hire
A growing number of dark web recruitment pages could see your staff snared into an ongoing role.
Implementing ISO 27001 and Avoiding Potential GDPR Consequences
Steps businesses can take to implement ISO 27001 and avoid potential consequences from the GDPR.
Moody’s Cyber Ratings Could Not Come at a Better Time – if They’re Done Right
Moody's will add cyber risk into credit ratings, how can that be done?
New Year. New Job. Same Threat.
The new year means an influx of job applications. How securely are you storing these details?
Navigating the Murky Waters of Data Policy Innovation in 2019 and Beyond
Which barriers does data privacy face in this new year?
The Retail Industry’s Third-Party Data Breach Problem
Some of the world’s top brands still suffer data breaches as they do not address third-party service threats.
Japan and the EU Create a Free Flow of Data
How the adequacy decision between Japan and the EU will enable and affect data security.
Receiving Tons of Unexplained Out-of-office Emails?
How you can fall victim to an email account takeover, and what the indicators are.
Accessibility Trumps Security in the Battle Between Authentication Alternatives
We have the technology to make authentication more secure, so why do we insist on outdated, tired and inferior solutions?
Why Open Port Monitoring is Both an Essential and Flawed Security Control
Checking for open ports sounds simple, but the reality is way off.
Is Security The Loser As Open Banking Takes Hold?
What security challenges does PSD2 and open banking present?
Safely Stretching Resources to Meet Industrial Cybersecurity Needs
ICS leaders turn to specialized skillsets and advancements in secure remote access to further their industrial cybersecurity.
Suspending Privacy Shield? A Look at What's At Stake
Market demand for Privacy Shield is soaring while being under review by the European Commission.
Would Cybersecurity Professionals Make the Best DPOs
Could a cybersecurity professional have the skills to become a data protection officer?
Fingerprint Sensors are Not the Guarantee to Privacy
How fingerprints are being used for authentication, but may not be flawless.