Infosecurity Opinions
Security AI is more than an Algorithm
All analytics will be more effective when provided with rich, high-fidelity sources of data.
Is Sandboxing a Playground for Browser-Borne Threats?
Given today’s evasive threats, will sandboxing be considered an adequate form of security for much longer?
Phishing in the Deep End: The Growing Threat of Attacks Beyond Email
The primary target has now become the unsuspecting person using these devices and systems.
Mitigating IoT Cyber Risks: Training is the First Step
Roles which five years ago we would never have thought of as requiring cybersecurity training, will need it as adoption of connected devices continues to rise.
It Started with a Phish
The four key elements of an anti-phishing program.
Are Bug Bounty Programs the Answer to Secure Endpoints?
Like with any security protection, don’t just rely on one form – bug bounties aren’t a silver bullet.
Shrouding IoT Security in the Fog
By virtue of its distributed architecture, fog computing secures everything from the cloud to the device.
Protecting a Mobile Workforce with Hybrid DNS Security
The root of many of data breaches, and the damage and stress that accompanies them, lies the DNS.
Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable
The security of cryptocurrency is irrelevant if the exchange in which it is stored it is not secure.
Nice Quotes, But I Wouldn’t Take Cybersecurity Advice from Alphonse Karr
Changes are both the enemy and the ally of cybersecurity, but in both cases, it is absolutely not the case that security is unaffected by change.
Departing Employees Should Not Mean Departing Data
With more than two-thirds of organizations experiencing data theft when employees depart, you need to protect your organization against insider threats.
Education and Training: The Downfall of File-Less Attacks
How to train employees to understand and identify an advanced "volatile" threat.
SEC Cybersecurity Update May Lead to Increased Oversight
What the SEC statement means for companies, who could choose to follow its advice or ignore it altogether.
What is KMIP and Why Should Anyone Care?
KMIP allows the interoperable exchange of data between different key management servers and clients, but why does it matter?
Why Do VPNs Need To Be GDPR Compliant?
Now GDPR has been in force for over a month, why do VPNs need to be compliant too?
Security Automation Soars to Top of Agenda
Security orchestration, automation and response platforms need careful consideration in easing the security management burden.
How Pseudonymous Reputation and the Dark Web Have Made Cybercrime Easier Than Ever
Today an array of marketplaces, infrastructure, and technology empower much more ordinary actors to commit crime on a massive scale with impunity.
The Inefficient Battle Against Phishing Attacks and the Technology to Turn the Tides of War
When enough people flag a sender as spam, they will be blacklisted, but it's important for providers to constantly adapt and block spammer accounts.
A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection
The earlier you can detect a cyber-attack, the higher the probability of preventing data breaches. So what is preventing that early detection?
Detecting and Responding to Cryptojacking with Artificial Intelligence
How artificial intelligence can help to detect and respond to cyber-criminals harnessing computer power to mine cryptocurrency.