Infosecurity Opinions
Prioritizing Automated Control Assurance for Cyber Hygiene
The foundational security controls that are collectively referred to as ‘cyber hygiene’ are anything but basic to implement.
Big Data and Cybersecurity - Making it Work in Practice
By applying advanced analytics techniques to huge amounts of data, infosec teams can better detect and defend against sophisticated attacks.
Managing Risk in the NHS Starts with Retiring Legacy Applications
Why legacy applications are causing a security illness for the NHS.
Blurred Lines Between Networking and Security
Networking and security used to be largely separate IT methodologies – not any longer.
AI in the Workplace: How Digital Assistants Impact Cybersecurity
AI utility may come at the cost of security, as these devices are vulnerable to potential hacking.
The Superhuman Security Analyst: Are We Expecting Too Much?
Are we expecting too much from the security operations analyst?
The Three Questions to Ask Before Migrating to the Cloud
Though the cloud is newer and more open across the board, any organization should be cautious about moving to a new service model.
What does DevOps do in 2018?
How DevOps will develop further and see adoption increase in 2018.
How Much Visibility do we Really Need?
The obvious answer to confronting breach fears would be to gain as much visibility into traffic as possible.
Cybersecurity: What Does the Board Want and Need?
Board members are under pressure from all sides to keep data and business operations safe from cyber-attack.
2017: The Year of Email Data Breaches
Email data breaches were the main cause of critical data loss in financial, legal and professional firms in the UK in 2017.
CAPTCHA + reCAPTCHA: Are they the Best Fraud Prevention Solution for your Business?
Despite the security and UX improvements, there are still many ways for bad actors to get around CAPTCHA systems.
Top Cybersecurity Training Priorities
With new legislation coming into play in 2018 and the constant onslaught of ever-changing threats, it can be hard to determine where one should concentrate cyber efforts.
Hyper-Convergence and the Need for Greater Encryption
The challenge of encryption and hyper converged infrastructures.
Moving to the Cloud, but Stuck in the Past
Security architectures have become the biggest area of friction when moving to the public cloud.
Changing Face of DDoS and Threats to the Web Application Layer
It is clear that Mirai is still very much a disruptor, but over a year later, we can ask what lessons have been learned, and where we go to next.
Trust Wanes, Mitigation Reigns and a Mind-Set Change in 2018
The (mis)happenings of 2017 have illuminated poor practice and should serve as a call to action to individuals and businesses.
Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business
VDRs serve as the modern gold standard in information security.
Phishing Simulation Training Escalation
One area of phishing simulation training that may not have matured is that once the metrics are analyzed, what do you do with the repeated clickers?
Coprocessor Attacks: the Hidden Threat
Coprocessors typically run their own firmware which—like any other computer code—can be vulnerable to attack.