Infosecurity Opinions
Bad Behavior at Work: Protecting Employees from Themselves
The desire to communicate is hardwired into humans, but with thought - and the deployment of appropriate technology - risk can be mitigated or avoided without impacting productivity or morale.
In Blockchain, There is no Checkmate
At its core, the Blockchain is immutable, transparent, encrypted and fragmented and.as such, Blockchain and cybersecurity seem like a match made in heaven and for the most part, they are.
Reducing Analyst Fatigue with Machine Learning
Using machine-learning platforms, security analysts will be able to focus on more important decision-making in situations.
Is Cloud Migration Complexity Depriving the Public Sector of Security Talent?
Given the skills gap and the stakes at play, security talent needs to be best deployed where it is most needed – at the front line.
For Applications: It’s the Problem, Not the Symptoms
Why wasted time and investment in application security needs to be stopped, and understand how data is exposed.
Why It’s Time to Nuke the Password
Where does the solution lay if we are to remove passwords from authentication processes?
How Businesses Can Overcome the Challenges Saas Presents to Compliance
As organizations continue to ramp up their use of cloud services, organizations must be aware of the threat that SaaS usage poses to continued GDPR compliance.
TLS is Dead, Long Live TLS
Why adoption of TLS 1.1 is being forced by the PCI council.
The Double-Edged Sword of Open-Source Code
Attackers are well aware how commonly open source code is used.
BA and Newegg - How Can Friendly Site Javascript Attacks be Stopped?
Magecart continues to collect high profile victims, why is it so successful?
How Do You Secure a Constantly Changing IT Landscape?
Everyone should understand why cyber hygiene is critical, but IT managers need to understand how to implement the principles.
Do You TRUST an Organization After it Suffers a Breach?
Why a data breach means so much more than just the hard costs, and how to prevent the harm.
How Secure are your Biometrics?
From improvements upon the oversight of passive facial biometrics to recommendations on building technical platforms, there's a national conversation taking place on biometrics.
Distributed Correlation and the Future of SIEM
At the center of an intelligent SOC lies the ability to efficiently extract intelligence from the huge volume
Don’t Let Privileged Accounts Be a Privilege to Outsiders
Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye.
“It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems
The biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue.
The Evolving Language of Cybersecurity
Raef Meeuwisse analyzes what is driving the evolution of language in the information security industry
A Smarter Approach to Security Will Reduce the Risk of Malware
Preventative action needs to be taken but with security teams and resources spread thin, what more can organizations do to enhance their security?
No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats
The three most common threats, according to the ISF's Threat Horizon.
Hackers as Heroes: How Ethical Hacking is Changing the Industry
Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.