Infosecurity Magazine Features
Securing the Human to be Mightier than the Computer
People, not technology, are becoming the key to securing organizations today. For years organizations have invested in technology such as anti-virus, firewalls, full disk encryption or data loss prevention.
Securing Apps Critical to Advancing mHealth
What started with a wave of fitness tracking tools has rapidly evolved into an active marketplace of smartphone apps and add-ons, networked personal health devices, Big Data analytics, and transformative healthcare delivery models.
Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016
To move forward in a healthier direction, I’ve identified five common approaches organizations should avoid for a more productive 2016.
Trust Who You Are Online With
The basic problem is that the internet was built, famously, without an identity layer. That is, its design includes no way for anyone to know with certainty what or which whom they are connecting.
Suffering Security Lag?
The recent spate of security incidents provides timely evidence that our adoption of technology appears to be outstripping our ability to protect it.
DMARC Specification Poised to Take Webmail Woes by Storm in 2016
The DMARC specification has been developed for web-based mail, which makes it virtually impossible for attackers to spoof, or fake, emails from a protected domain.
TalkTalk: the British Entry for Breach of the Year 2015
Everything’s always ‘bigger and better’ in the US, or at least that’s what they say. Unfortunately for federal employees and American consumers, this also means data breaches that have hit tens of millions over the past year.
Keeping Software Defined Data Centers Secure
Companies take all the aspects of an SDDC and think that everything has to be implemented at once.
Managing the Mobile Gap
"The frequency of updates is unparalleled. There have been 14 versions of iOS in the past year. And if you look at apps, every app update is a new app, every OS update is a new OS. And there are undocumented features with every update."
Cyber-Psychology: The Key to Securing the Human Element in Your Organization
Cyber-psychology as a discipline is concerned with the interaction of the mind and behavior with various forms of information communication technology. Not only email, the internet and social media, but also virtual reality, gaming and smart devices.
Eyes on the Target
The threat vector that we’re seeing are the same ones that you’re seeing frankly all over the news.
Cybersecurity and the next POTUS
Security is always going to play a big part in any political race in America.