Infosecurity Opinions
Non-Security Tips for Security Professionals
Security professionals should adapt their skill sets to communicate effectively with a newer and more senior set of stakeholders.
Deception as Defense - Turning the Tables on the Hackers
New approaches are emerging in which organizations can turn the tables on the attackers
Cyber Insurance Achilles Heel Contains Opportunity
Reports of many companies adopting cyber insurance at a rapid rate is a bit at odds with the experience of many in the insurance community.
Addressing and Mitigating Application Vulnerabilities
As developers, we create applications that introduce risk into the lives of others.
Mega Data Breaches Could Drive the Blockchain Revolution
Blockchain is the ideal candidate for a variety of data security applications, and the information security world has already begun to take notice.
Ransomware Set to Increase, With Attacks to or from the Cloud
These attacks are getting smarter and harder to detect and mitigate - hackers will continue to exploit the fact that someone needs or wants their data back
Driving a Culture of Security - Tips For The CIO
Combating the cybersecurity skills gap both in terms of recruiting quality talent and employee awareness continues to be a top concern for the board.
Open Season: How Phishing Attacks Up Their Game
Are we now more fallible to phishing? Phishing emails certainly used to be easy to spot.
GDPR: Innovation Deterrent or Incentive?
Since GDPR was originally proposed by the European Commission in 2012, criticisms of the new regulation have been far-ranging.
Profiling The Insider Threat - Breaking Down a Complex Security Term
Identifying five insider threat profiles to show the complexity of the problem.
Darkonomics 101: The Underground Market for PII
PII can yield serious consequences for its original owners while providing handsome pay-outs to cyber-criminals.
A Data-Driven Approach to Security Decision Making
Containers are an unstoppable force of disruption, replacing virtual machines by the dozens. Yet, containers have a far larger attack surface than virtual machines.
A Measured Incident Response
Understanding the nature and extent of the cybersecurity incident is critical for successful eradication.
I Spy: A Clear and Present Inside Danger
Today, satisfied or disgruntled employee, your colleague, or even your boss can pilfer data.
It's Time to Speak in the Language of Risk
Considering cybersecurity professionals came from this deeply rooted, technology-focused place, shifting to speaking risk is almost like learning a foreign language. So how can they make the transition as smooth and seamless a possible?
Frequency and Trends with Benefits
Rigorous reporting that includes insights into frequency and trends will show if they are working properly and being effectively managed.
Overcoming the Rise of IoT-Based Botnets
Mirai turned out to be the perfect catalyst for harnessing more CPU and bandwidth from the most unassuming devices on a massive scale.
Advanced Malware Detection - Signatures vs. Behavior Analysis
Both signature and behavior-based malware detection are important and have advantages. The best security will come from utilizing both technologies.
How to Measure the Effectiveness of Security Programs
Organizations struggle to understand how to measure the return on investment. This often results in employing point technologies without considering the complexity of integrating into existing systems, or relying on traditional security controls that are out of date and processes that have not adapted to the changing threat landscape.
Applying Military Protocol to Cybersecurity Best Practices
The majority of protection systems rely on passwords. If a hacker manages to get hold of one via a phishing exploit the rest is history.