Infosecurity Opinions
Tools of the Trade: Browsing Through the Hack Store
By learning how to use free or low-cost downloadable and widely available tools, hackers can empower themselves over just about any mobile or desktop device, as well as over supposedly secure on-line network
Important Tips for Updating Your Breach Response Plan
Dan Sarel, co-founder and VP of product management at Demisto, explores the importance of having an effective breach response plan
An Information Security Survival Guide
Shred-it's Andrew Lenardon walks through the fives steps to a culture of security
Four Applications You Should Blacklist Today
It is important that companies take a proactive approach to blacklisting and removing high-risk applications or applications that have entered end-of-life
Noisy Fans & Fake Deli Coupons: How Hackers are Winning Now
In the race to come up with new and more sophisticated ways to invade victims' computers and networks, hackers will use any means necessary – even a computer's fan
Protect Your Enterprise by Balancing WordPress Plugins
SiteLock President Neill Feather and Crowd Favorite CEO Karim Marucchi outline what enterprises should consider in order to protect themselves from exposure via WordPress, mitigate cyber risks, and still ensure a pleasant online user experience
Preventing Privileged Account Abuse
Fraud or theft that occurs as a result of privileged account abuse is one of the most challenging for organizations to identify
Edge Computing & Security: Rethinking Compliance & Data Protection in a Mobile-First Environment
IT today is no longer solely linked to specific machines sitting on desks; the growth of mobile and remote working means that users have more options on what devices they use, how they use them and where they get work done
How Can We Achieve 50/50 Gender Parity in Cybersecurity?
Lucy Chaplin, associate of (ISC)², manager at KPMG, on how the company tackled the gender gap in security
The Cyber Cold War: the Newest Front in Political & Corporate Espionage
The days of spies looking to get their hands on state and trade secrets are still alive and well today - except, now they’re digital
The Changing Role of the ISP & How Net Neutrality Laws Impact Cyber Defense
Net neutrality is one of the internet’s guiding principles. The concept that Internet Service Providers (ISP) should direct all content and traffic from one destination to another, without passing judgment about the content, is widely recognized as the best means to preserve free speech online and encourage economic growth
Think People First when Improving Cybersecurity Posture
Cybersecurity remains a frequent topic of discussion throughout many enterprises due to high-profile breaches
The Pros and Cons of DNS Encryption
The way governments deal with cybersecurity monitoring has never been more at the forefront of industry discussions, particularly with ongoing debate in the UK around the Investigatory Powers Bill raising the question of how – and if – governments should monitor data transmissions
The Four Cybersecurity Terms Businesses Need to Know
Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind
The Four Steps to AppSec in the Age of Dynamic Language Processing
With more and more companies moving to the cloud to run their businesses, the pressure on developers to push out web applications at a rapid pace is continuing to grow
The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For
Security teams need to take advantage of a significant source of intelligence already available in the company - the HR team
A Guide to Cyber Threat Hunting Operations
Tim Bandos, director of cybersecurity at Digital Guardian, discusses where businesses should start when conducting their own cyber threat hunts
Are We Reaching Peak Data?
Many security teams cannot respond to what is in front of them, because there is simply too much
Tit-for-Tat: Cyber Retaliation
In recent weeks, two examples highlight the dangerous precedent of the 'tit-for-tat' mentality in the cyber domain
Breach Detection or Breach Prevention?
How can IT teams balance the need to prevent with the need to detect?