Infosecurity Opinions
The Three Questions to Ask Before Migrating to the Cloud
Though the cloud is newer and more open across the board, any organization should be cautious about moving to a new service model.
What does DevOps do in 2018?
How DevOps will develop further and see adoption increase in 2018.
How Much Visibility do we Really Need?
The obvious answer to confronting breach fears would be to gain as much visibility into traffic as possible.
Cybersecurity: What Does the Board Want and Need?
Board members are under pressure from all sides to keep data and business operations safe from cyber-attack.
2017: The Year of Email Data Breaches
Email data breaches were the main cause of critical data loss in financial, legal and professional firms in the UK in 2017.
CAPTCHA + reCAPTCHA: Are they the Best Fraud Prevention Solution for your Business?
Despite the security and UX improvements, there are still many ways for bad actors to get around CAPTCHA systems.
Top Cybersecurity Training Priorities
With new legislation coming into play in 2018 and the constant onslaught of ever-changing threats, it can be hard to determine where one should concentrate cyber efforts.
Hyper-Convergence and the Need for Greater Encryption
The challenge of encryption and hyper converged infrastructures.
Moving to the Cloud, but Stuck in the Past
Security architectures have become the biggest area of friction when moving to the public cloud.
Changing Face of DDoS and Threats to the Web Application Layer
It is clear that Mirai is still very much a disruptor, but over a year later, we can ask what lessons have been learned, and where we go to next.
Trust Wanes, Mitigation Reigns and a Mind-Set Change in 2018
The (mis)happenings of 2017 have illuminated poor practice and should serve as a call to action to individuals and businesses.
Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business
VDRs serve as the modern gold standard in information security.
Phishing Simulation Training Escalation
One area of phishing simulation training that may not have matured is that once the metrics are analyzed, what do you do with the repeated clickers?
Coprocessor Attacks: the Hidden Threat
Coprocessors typically run their own firmware which—like any other computer code—can be vulnerable to attack.
Past and Present Tactics of Ransomware Attacks
Choosing the ransomware delivery mechanism is mostly a question of money.
What Does Data Loss Mean for Your Business?
Businesses need to get serious about data protection if they don’t want to be exposed to significant risks.
Understanding the Strengths and Weaknesses of Biometrics
Significant advances have now made biometric authentication a truly viable and secure alternative to traditional forms of security.
Securing Smart Devices Requires Smarter Partnerships
While there are few IoT device vendors focused on adding security, this presents a big opportunity for manufacturers willing to be proactive in implementing and educating the market about the need for stronger security.
The Evolution of Corporate Authentication
While it’s easy to feel overconfident if you’ve been lucky enough to avoid this type of problem, complacency can harm your business.
Key Questions any CEO Should ask Before Moving to the Cloud
As your organization makes the move to the cloud, managing security risks should be on the top of your list.