Infosecurity Opinions
Are Smart Cities Smart Enough to Tackle Cyber Attacks?
How smart cities can be security nightmares, but with the right regulation could there be a bright and secure future?
Microsoft's Commandment: Thou Shalt Not Worship (Password) Idols
Active Directory centralizes authentication and authorization for domain resources, but also creates a critical single point of failure.
Preventing the Cloud from Becoming a Digital Dumping Ground
Cloud has perhaps had the biggest impact on security owing purely to its scale.
How to Secure Your Data, Smart Tech, and Digital Assistants
AI devices open up a slew of privacy questions that leave businesses stuck choosing between efficiency and data security.
Security Analyst: The New Data Scientist
Data science skills have become more common as Universities offer a wide selection of courses on the subject.
Standardization in the Year of the Chatbot
Successful organizations will be asking not only what AI – or more automation – can do for them, but how they can adapt processes and security protocols to AI.
The Pros and Cons of DIY Application Security
How can open source and internally-built security not end up as a “Franken-platform”?
Ways for MSSPs to Survive in the New Infosec Age
To remain competitive and profitable while maintaining quality of service, MSSPs must change their mindsets.
Measure and Manage Your Cloud Security in Five Steps
Cloud security will always be governed by rules, measuring against those rules will help you define your purpose and identify the goals you need to hit.
Five Security “Gotchas” for MSPs
Common attacker tricks which plague the managed security provider.
Think You Know Ransomware? Think Again
Where did ransomware come from, is it a new threat, how is it evolving and what steps can organizations take to protect against it?
The Implications of Silent Injection Malware on Retail Security
Malware specifically targeted at point of sale devices has evolved over the past few years.
Data Security Obligations Could be Increased in North Carolina
How North Carolina's data protection obligations could be the most stringent in the USA.
Life Under #GDPR and What It Means for Cybersecurity
What you should know about how GDPR will shift the landscape of cybersecurity, and what measures to take to be ready.
What Organizations Can Do to Strengthen Their Cybersecurity Stance
There are times when organizations, even those with SOCs that are skilled and staffed appropriately, may need a little help.
2018 Faces New Threats, But Same old Problems
Every year brings a new set of cyber-threats but threats of 2017, 2016 and beyond are still with us.
Could Your Company Become a Cryptojacking Victim?
Attackers find it cheaper to mine cryptocurrency by infiltrating and accessing someone else’s CPU or GPU power than pay for it themselves.
It Is Time for the CISO to be at the Table
A CISO in the boardroom is still an odd occurrence, so does the CISO need to change the way they think and interact with the business?
Building a Successful Data-Centric Audit and Compliance Program
A successful implementation of DCAP will eliminate the complexity and inefficiencies of today’s silo-based data security environments.
GDPR and the State of Employee Data Privacy
Rather than trying to fix each problem individually, ask what is the best way to truly control information?