Infosecurity Opinions
The Cyber Cold War: the Newest Front in Political & Corporate Espionage
The days of spies looking to get their hands on state and trade secrets are still alive and well today - except, now they’re digital
The Changing Role of the ISP & How Net Neutrality Laws Impact Cyber Defense
Net neutrality is one of the internet’s guiding principles. The concept that Internet Service Providers (ISP) should direct all content and traffic from one destination to another, without passing judgment about the content, is widely recognized as the best means to preserve free speech online and encourage economic growth
Think People First when Improving Cybersecurity Posture
Cybersecurity remains a frequent topic of discussion throughout many enterprises due to high-profile breaches
The Pros and Cons of DNS Encryption
The way governments deal with cybersecurity monitoring has never been more at the forefront of industry discussions, particularly with ongoing debate in the UK around the Investigatory Powers Bill raising the question of how – and if – governments should monitor data transmissions
The Four Cybersecurity Terms Businesses Need to Know
Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind
The Four Steps to AppSec in the Age of Dynamic Language Processing
With more and more companies moving to the cloud to run their businesses, the pressure on developers to push out web applications at a rapid pace is continuing to grow
The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For
Security teams need to take advantage of a significant source of intelligence already available in the company - the HR team
A Guide to Cyber Threat Hunting Operations
Tim Bandos, director of cybersecurity at Digital Guardian, discusses where businesses should start when conducting their own cyber threat hunts
Are We Reaching Peak Data?
Many security teams cannot respond to what is in front of them, because there is simply too much
Tit-for-Tat: Cyber Retaliation
In recent weeks, two examples highlight the dangerous precedent of the 'tit-for-tat' mentality in the cyber domain
Breach Detection or Breach Prevention?
How can IT teams balance the need to prevent with the need to detect?
As Industry 4.0 Marches on, the Manufacturing Sector Must be Better Prepared for Cyber-Attacks
The idea of factories full of driverless forklifts and collaborating robot workers was once the stuff of pure science fiction, but has now become the common reality for smart factories around the world
How to Avoid Drowning in your Security ‘Data Lakes’
Security monitoring is a ubiquitous task throughout all enterprises that are attempting to not only thwart malicious activities but to understand and optimize authentic traffic to their information systems
How to Prepare for the EU GDPR
A recent report revealed that only 4% of British companies understand the impact of the European Commission’s upcoming GDPR. For the remaining 96%, it is very much in their interest to find out
Effective App Security: the Importance of Collaboration throughout the Command Chain
In today’s online business environment, application security has never been more important. However, effective app security doesn’t just happen overnight, it requires a concerted effort from all parts of the business command chain
Are Unsecure Medical Devices Opening the Backdoor for Hackers?
Medical/health institutions must prioritize the management of user access if they want to ensure they have the adequate security levels around these access points
Signatures Are Dead, Now What?
With LANGSEC technology able to instantly and accurately identify any malicious behavior within an application, why risk securing your application solely with perimeter protections?
The CISO Insomniac: What’s Keeping Them Awake at Night?
There has never been a tougher time to be a Chief Information Security Officer. Regulatory changes across the EU have led to the introduction of much more stringent controls on how businesses should manage the customer data they collect
Media Organizations Beware – DDos Attacks are Coming
There are many reasons behind a DDoS attack but one thing we have continued to see is the rise of DDoS attacks on media publications