Infosecurity Opinions
Somebody Else's Security: Rethinking Cloud FUD
The list of enterprise IT organizations who had their private data publicly exposed in 2017 because of misconfigured AWS S3 buckets is long.
Effectively Managing Mistrust for Optimal Cybersecurity
It’s vital that businesses work together to share information to stay one step ahead of the ever-evolving threat landscape.
Undermining Crypto-Threats
Cryptomining has the potential to be as big a threat a ransomware, and it is harder for law enforcement to track the perpetrators.
Establishing Trust in a World without Boundaries
This brave new world has new security challenges, necessitating a new strategy based on a perimeter-less, “zero-trust” approach.
Protecting Privileged Identities: Why IAM starts with PAM
Like any good security measure designed to protect critical information assets, managing and protecting privileged accounts requires both a plan and an ongoing program
Bouncing Back from Cyber Attack
Knowing where to get started a cyber-attack specific disaster recovery plan is always half the battle..
Zero Trust: Method or Madness?
Zero Trust is a method of security where the central premise is ridiculously simple: trust no one.
The Role of Automated Asset Management in Industrial Cybersecurity
Without an up-to-date and accurate inventory of ICS assets, including the automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.
NIS Directive Is a Good Start for Railway Cybersecurity - But It's Not Enough
Although the NIS Directive represents an essential step towards securing critical infrastructure, its shortcomings are palpable with regard to the rail industry.
Go Overseas to Solve the US Infosecurity Talent Crunch
We need to create international security teams, not just those ones who are siloed by countries or individual companies.
Protecting your Network Against Ever-Changing Cyber-Attacks
In the age of IoT and cloud, it’s getting worse for these traditional defenses.
What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities
Attacks on OT systems are rapidly escalating, yet many industrial organizations continue to focus cybersecurity efforts on IT-centric, rather than production-centric, endpoints.
UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?
If we don’t take action and follow government guidelines on IoT, then Parliament will be forced to enact legislation.
Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts
Companies are adopting privileged account technology to monitor behavior and secure their sensitive data.
GDPR is a Good Idea For US Companies, Even if it is Not Law
On the dawn of GDPR, and with the spotlight on major data breaches, perhaps the US is ready to take another run at data privacy regulation.
GDPR is Here, So What's Next for Cybersecurity Professionals?
The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.
Why Supply Chain Security Should be a Strong Link
Supply chain threats warn that the UK should expect a higher volume of attacks, but also ones with an increased amount of planning.
Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach
The Equifax breach and WannaCry ransomware may have nothing in common, but both involved hackers who exploited unpatched vulnerabilities in Windows 7 and Windows 8.
Communication, Collaboration & Orchestration: 10 Vital Steps to IT Alerting Automation
The challenge for companies is to plan for major IT incidents before they occur and, be able to respond with required velocity, control and communications.
Why the Adoption of Edge Computing Demands a New Approach to Data Security
Edge computing is defined as moving data processing power to the “edge” of a network, and processing this information at the edge allows for faster response times and consistent data collection.