Infosecurity Opinions
A Data-Driven Approach to Security Decision Making
Containers are an unstoppable force of disruption, replacing virtual machines by the dozens. Yet, containers have a far larger attack surface than virtual machines.
A Measured Incident Response
Understanding the nature and extent of the cybersecurity incident is critical for successful eradication.
I Spy: A Clear and Present Inside Danger
Today, satisfied or disgruntled employee, your colleague, or even your boss can pilfer data.
It's Time to Speak in the Language of Risk
Considering cybersecurity professionals came from this deeply rooted, technology-focused place, shifting to speaking risk is almost like learning a foreign language. So how can they make the transition as smooth and seamless a possible?
Frequency and Trends with Benefits
Rigorous reporting that includes insights into frequency and trends will show if they are working properly and being effectively managed.
Overcoming the Rise of IoT-Based Botnets
Mirai turned out to be the perfect catalyst for harnessing more CPU and bandwidth from the most unassuming devices on a massive scale.
Advanced Malware Detection - Signatures vs. Behavior Analysis
Both signature and behavior-based malware detection are important and have advantages. The best security will come from utilizing both technologies.
How to Measure the Effectiveness of Security Programs
Organizations struggle to understand how to measure the return on investment. This often results in employing point technologies without considering the complexity of integrating into existing systems, or relying on traditional security controls that are out of date and processes that have not adapted to the changing threat landscape.
Applying Military Protocol to Cybersecurity Best Practices
The majority of protection systems rely on passwords. If a hacker manages to get hold of one via a phishing exploit the rest is history.
2016 Year of the Mega-Breach, More to Come?
With over 4 billion records leaked last year, 2016 was a record-breaking year for data security. A look at the key findings and takeaways of the recently published IBM X-Force Threat Intelligence Index.
Prevent Your Most Secure System from Becoming Your Achilles Heel
All over the world, the biggest banks, insurance companies, telcos, and other private enterprises store the majority of their most critical and sensitive customer data and intellectual property on the mainframe. The reason is simple; the mainframe remains the most secure system around.
Hello IoT, Goodbye Security Innocence
What does IoT mean for service providers and what can they do to get ready and future-proof both profit and innovation?
Brakes and Breaches: Why the Board Treats Them the Same
A precedent exists to fire, or significantly cut the compensation of, the chief executives in charge of either brake failures or security breaches.
Phishing - Why We Keep Getting Netted
While some individuals may be practicing cyber safety online, phishing is still one of the most powerful and persistent forms of cyber-attack going.
Strengthening Authentication Measures for Enhanced Mobile Security
Great authentication measures are still prone to thievery.
Towards More Enterprise Security for IoT
Which standards are needed to ensure IoT can be used in enterprise security.
Cyber-Threat and Regulation Priorities for CISOs
Future CISO priorities include dealing with DDoS, GDPR, and third-party threats.
Is your Cloud Governance Agility Enough to Keep up with DevOps?
Agility rules when it comes to DevOps, yet cloud governance models follow structured methods.
History Repeating: Top Five Database Threats
It might be time for some organizations to get back to the basics when it comes to database security: best practices, internal controls, and database security solutions.
Critical Takeaways from WikiLeaks 'Vault 7' Release
Three particularly critical cybersecurity issues that the WikiLeaks release brings into stark focus.