Infosecurity Opinions
#2018InReview IoT Security
How did IoT security improve, or not, over the past 12 months?
#2018InReview Women and Diversity in Cybersecurity
In 2018, the industry began waking up to diversity in all its forms – experience, thinking, age, gender, ethnicity.
#2018InReview Security Culture
How much did security culture levels improve in 2018, and what were the determining factors if so?
Why the CISO’s Voice Must be Heard Beyond the IT Department
A CISO needs empowerment to influence budget decisions, project decisions and even IT decisions
#2018InReview Government Security
Looking back at the year in government security, in compliance, legislation and when two cities were locked down by ransomware.
#2018InReview Cloud Security
Spending in cloud security increased in 2018, as IaaS platforms became the norm.
#2018InReview Subtle Shifts in Financial Services Security
While compliance dominated 2018, subtle shifts affected financial services security too.
#2018InReview Healthcare Cybersecurity
How 2018 proved to be a constant challenge for those in healthcare cybersecurity.
#2018InReview Cybersecurity Awareness
What the cybersecurity year looked like from an awareness perspective.
A Little Chaos Now and Then is the Best Test for Resilience
How Chaos engineering and testing can work for you.
Geo-Velocity Based Adaptive Authentication: A New Layer of Security for Enterprise Information Systems
Geo-velocity based authentication relates the login history of users with their login locations.
Why Investment in Autonomous Cyber Defense is Needed
We need to be investing in the potential of non-human defenses.
Are Micro Businesses in the Dark Over Cybersecurity?
How vulnerable are micro businesses to cyber threats?
Why Deep Defense Should Start with Detecting Compromised Credentials
Obtaining valid credentials using multiple mechanisms and tools continues to be extremely lucrative for a cyber-criminal
Why is ‘Attribution’ Still the Focus Following Cyber Attacks?
Our obsession with “who” is behind an attack, instead of the “how” left attackers with a sandbox to deploy, test and adjust the level of sophistication of their attack capabilities.
Managing Firewalls in the Cloud: do Companies Know Enough about Security Intent?
Businesses think less about centralized firewalls, and more about cloud.
Attack is the Best Form of Defense, Time to go Threat Hunting
Traditional (reactive) cybersecurity defense should be used in conjunction with proactive cyber threat hunting.
A Little Less Complication: Does the UK Need a New Cyber Council?
If approved, what impact would a UK Cybersecurity Council have?
OWASP Sting: How Education Can Take the Bite out of Common Vulnerabilities
It should be a wake-up call to the industry that the most common security threats have remained nearly unchanged since the first OWASP list 15 years ago.
Cybersecurity, Conference Lineups and Kenan Thompson
Certainly, conference organizers bear ultimate responsibility for their speaker lineup.