Infosecurity Opinions
Education and Training: The Downfall of File-Less Attacks
How to train employees to understand and identify an advanced "volatile" threat.
SEC Cybersecurity Update May Lead to Increased Oversight
What the SEC statement means for companies, who could choose to follow its advice or ignore it altogether.
What is KMIP and Why Should Anyone Care?
KMIP allows the interoperable exchange of data between different key management servers and clients, but why does it matter?
Why Do VPNs Need To Be GDPR Compliant?
Now GDPR has been in force for over a month, why do VPNs need to be compliant too?
Security Automation Soars to Top of Agenda
Security orchestration, automation and response platforms need careful consideration in easing the security management burden.
How Pseudonymous Reputation and the Dark Web Have Made Cybercrime Easier Than Ever
Today an array of marketplaces, infrastructure, and technology empower much more ordinary actors to commit crime on a massive scale with impunity.
The Inefficient Battle Against Phishing Attacks and the Technology to Turn the Tides of War
When enough people flag a sender as spam, they will be blacklisted, but it's important for providers to constantly adapt and block spammer accounts.
A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection
The earlier you can detect a cyber-attack, the higher the probability of preventing data breaches. So what is preventing that early detection?
Detecting and Responding to Cryptojacking with Artificial Intelligence
How artificial intelligence can help to detect and respond to cyber-criminals harnessing computer power to mine cryptocurrency.
In Bots We Trust: Better Enterprise Security Through AI
Post GDPR and pre AI, the enterprise needs to entirely transform its thinking about security.
The Next Big Lesson for Security: Context is King
We need higher-fidelity alerts contextualized across multiple facets of a system.
Security's Role in the Shift Left in Application Security
As the DevSecOps process requires developers to take greater responsibility for securing software as well as building it, consideration must be given as to what this means for members of the security team.
GDPR: Don't Rest on Your Data, We've Only Just Begun
May 25 was the starting line, we never know which way regulators and legislators are going to go until they act.
Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics
Five lessons on how to replicate terror investigations for the benefit of cyber.
Access all Areas - Not Anymore!
Unauthorized access to data is a huge downfall for many businesses.
Must Have Factors of a Mobile Security Policy
Tips on how to build a mobile security policy.
Why Life Under GDPR will Encourage Technology Innovation
The GDPR is the first step as data protection evolves from compliance to accountability – creating opportunities to develop new services as well as to improve public perceptions.
Do It Yourself? Could be a Painful Experience
A decision to buy will always be affected by whether or not you trust a vendor.
Security at the Speed of Business
Bringing security professionals into the business conversation as early as possible will allow them to lay out a plan where the business can grow but also be secure,
Batten Down the Hatches against Crypto-Mining Pirates
Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.