Infosecurity Opinions
TLS is Dead, Long Live TLS
Why adoption of TLS 1.1 is being forced by the PCI council.
The Double-Edged Sword of Open-Source Code
Attackers are well aware how commonly open source code is used.
BA and Newegg - How Can Friendly Site Javascript Attacks be Stopped?
Magecart continues to collect high profile victims, why is it so successful?
How Do You Secure a Constantly Changing IT Landscape?
Everyone should understand why cyber hygiene is critical, but IT managers need to understand how to implement the principles.
Do You TRUST an Organization After it Suffers a Breach?
Why a data breach means so much more than just the hard costs, and how to prevent the harm.
How Secure are your Biometrics?
From improvements upon the oversight of passive facial biometrics to recommendations on building technical platforms, there's a national conversation taking place on biometrics.
Distributed Correlation and the Future of SIEM
At the center of an intelligent SOC lies the ability to efficiently extract intelligence from the huge volume
Don’t Let Privileged Accounts Be a Privilege to Outsiders
Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye.
“It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems
The biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue.
The Evolving Language of Cybersecurity
Raef Meeuwisse analyzes what is driving the evolution of language in the information security industry
A Smarter Approach to Security Will Reduce the Risk of Malware
Preventative action needs to be taken but with security teams and resources spread thin, what more can organizations do to enhance their security?
No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats
The three most common threats, according to the ISF's Threat Horizon.
Hackers as Heroes: How Ethical Hacking is Changing the Industry
Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.
How Digital Transformation can Save Cybersecurity
Based on the concepts of digital transformation, an ‘unconventional’ and data-driven approach is needed to thwart new and unforeseen threats.
Preparing for the next European Union Directive: EU NIS
GDPR concerns every industry that handles data; EU NIS has a much more refined scope as it applies only to critical infrastructure.
“Zero Trust” Is the Opposite of Business
When you step back and consider the reason security is important, it’s not so clear that zero trust is really what we want.
Cybersecurity ROI Is a Measurable Metric – If You Know What to Measure
Determining true cybersecurity ROI involves not only measuring attacks that were mitigated, but also which attacks might have happened.
Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?
Most companies are looking at cybersecurity solutions as a series of “bolt-ons” to the existing tech stack, instead of mapping out a comprehensive plan to help monitor the threat landscape and execute defense against an attack.
Essential Elements Needed for a Successful Threat Hunt
Threat hunting is vital to reduce the spread and effectiveness of attacks, but a large proportion of organizations are yet to engage in this type of activity.
From the Developer’s Perspective - Navigating the IoT Security Storm
In the IoT gold rush, and the race to realize the market’s potential, many companies have been deprioritizing security.