Infosecurity Opinions
What Organizations Can Do to Strengthen Their Cybersecurity Stance
There are times when organizations, even those with SOCs that are skilled and staffed appropriately, may need a little help.
2018 Faces New Threats, But Same old Problems
Every year brings a new set of cyber-threats but threats of 2017, 2016 and beyond are still with us.
Could Your Company Become a Cryptojacking Victim?
Attackers find it cheaper to mine cryptocurrency by infiltrating and accessing someone else’s CPU or GPU power than pay for it themselves.
It Is Time for the CISO to be at the Table
A CISO in the boardroom is still an odd occurrence, so does the CISO need to change the way they think and interact with the business?
Building a Successful Data-Centric Audit and Compliance Program
A successful implementation of DCAP will eliminate the complexity and inefficiencies of today’s silo-based data security environments.
GDPR and the State of Employee Data Privacy
Rather than trying to fix each problem individually, ask what is the best way to truly control information?
Common IT Tools are the Hacker's Favorites
Monitoring and analyzing common IT tools will make life harder for attackers.
How to do More With Less in Cybersecurity
Security teams are under-resourced and over-pressured, so how can they do more with less?
Klepto Currency: Are Hackers Cryptojacking Your Processing Power?
In the race to generate currency, “miners” are utilizing clever tools and techniques to gain access to computing resources
'Western' and 'Eastern' Approaches in DLP Solutions
The differences between ‘western’ and ‘eastern’ approaches in the use of DLP solutions.
Accidental Insiders Pose a Serious Threat to Your Organization
The unintentional insider threat can be equally risky to the organization and is unfortunately quite common.
Avoid These Security Mistakes During Cloud Migration
How it is the “people” and “process” categories – that companies often miss during a cloud migration.
Working Smarter: Use Machine Learning to Merge IAM and SIEM
IAM and SIEM systems can give organizations the insight and clarity they so desperately need.
GDPR is Not a Ticking Timebomb for Huge Fines
Organizations are being told that on the 25th May they will go into compliance meltdown: It’s all got a bit out of hand to be honest.
Why Cyber Insurance Works
Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.
Building a Security Culture in the Age of GDPR
GDPR will present an opportunity to evolve from a systems-based approach to a data-driven one.
Spectre and Meltdown: Powerful Reminders of Side Channel Attacks
Many organizations had a recent experience with side channel attacks when security researchers announced the discovery of Meltdown and Spectre.
Does Ransomware-as-a-Service Enable More Cyber-Criminals?
Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.
The Tesla Hack is a Serious Cryptojacking Warning
The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.
Cryptojacking: Back to the Future
Cryptojacking is the perfect combination of two of the Internet's hottest trends - rampant hacking and the massive growth of cryptocurrencies.