Infosecurity Opinions
SAML - The Vital Hidden Ingredient in Effective Single Sign-On
SAML provides the capability for users to access resources from entirely separate domains using their own credentials.
Iot Botnets are Coming, How Can You Escape Them?
We probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of Minecraft gaming server providers.
Standards and Security: The Great DDoS Challenge
DDoS attacks are now moving towards more mission critical operations in hospitals, banks and universities.
Ransomware "Your Money, or your Data!"
There may never be a cyber-silver bullet to protect you 100% of the time against these pervasive threats; those who claim they can, will inevitably face disappointed end users.
A Growing Talent Shortfall Can Leave Apps Vulnerable
The skills shortage will prove to be an unlikely cause of serious application security weaknesses and data theft in the coming years.
From Data to Critical Infrastructure: Attackers Get Physical
We’re no longer talking just about regulatory fines and reputational damage, but the possibility of actual physical harm.
Training an Army of Cyber Defenders: The Case for Simulation
Cultivating security experience through a framework of simulation training
Coming to Terms with the Snooper's Charter
ISPA exists and unless attempts to amend it are successful, those of us working in the IT sector will need to comply with it.
A Reversed Approach to Tackling Insider Threats
By looking inwards – including continual monitoring of their internal networks and accumulated logs – organizations have fundamentally changed (and reversed) the age-old security mantra of defence.
How to Boost Your Information Security When Outsourcing
The possible ways of avoiding the main pitfalls in terms of protecting sensitive information.
The First Step to Uncovering Cryptography
As cryptography becomes increasingly complicated and perhaps gradually more unintelligible for humans (especially as we hand it over to AI), understanding the precepts of security and cryptography is essential to all businesses, especially those that provide internet services or store customer data in internet-based systems.
Video Game Security: The Future Belongs to Machines
Machine learning isn’t the solution to all of the problems in video game security, but it can take us a long way towards our goals.
The Challenges of Minimizing Data Security Risks
Software as a service (SaaS) is more and more becoming interesting to small and medium-sized businesses as a great solution to their IT needs.
Ransomware and Cyber-Insurance: What It Means for You and Your Company
If you’re one of the approximately one third of U.S. companies that purchase cyber-insurance to mitigate the costs of a security breach, you may be covered for a ransomware attack. But policies can vary greatly, and it’s important that companies understand the specifics.
How Machines are Waging War Against the Malicious Insider
There is a savior in sight and machine learning is gaining momentum and catching up with the sophisticated, malicious insider at a rapid pace.
Treating Ransomware in the Healthcare Sector
Ransomware is a serious problem across all industries, but increasingly the healthcare sector has become a primary focus for cyber criminals who are keen to capitalize on this sector’s need to run a 24/7/365 operation.
How to Guarantee Data Security When Data is in an External or Public Cloud
There's no doubt that shared cloud hosting offers many direct advantages to businesses, particularly those without extensive on-site data infrastructure. It's inexpensive, it's easy to access, it doesn't require maintaining your own hardware, and you've got experts on-call if there's ever an issue.
Security Breaches are Inevitable...Or Are They?
While exciting, new dynamics are accompanied by potentially catastrophic security implications and presents enterprise organizations with the significant challenge of balancing security with user privacy.
Cloud Data Remains Your Responsibility
It is the cloud provider’s responsibility to ensure your data is secured and protected within their environment, and their SLA should offer appropriate guarantees.
Decipher your Encryption Challenges
Why centralised encryption management is here to stay.