Infosecurity Opinions

Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics

Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics

Five lessons on how to replicate terror investigations for the benefit of cyber.

Access all Areas - Not Anymore!

Access all Areas - Not Anymore!

Unauthorized access to data is a huge downfall for many businesses.

Must Have Factors of a Mobile Security Policy

Must Have Factors of a Mobile Security Policy

Tips on how to build a mobile security policy.

Why Life Under GDPR will Encourage Technology Innovation

Why Life Under GDPR will Encourage Technology Innovation

The GDPR is the first step as data protection evolves from compliance to accountability – creating opportunities to develop new services as well as to improve public perceptions.

Do It Yourself? Could be a Painful Experience

Do It Yourself? Could be a Painful Experience

A decision to buy will always be affected by whether or not you trust a vendor.

Security at the Speed of Business

Security at the Speed of Business

Bringing security professionals into the business conversation as early as possible will allow them to lay out a plan where the business can grow but also be secure,

Batten Down the Hatches against Crypto-Mining Pirates

Batten Down the Hatches against Crypto-Mining Pirates

Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.

We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

Virtual Patching is emerging as a solution to the problem of too many unapplied software fixes.

How Much do Passwords Cost your Business?

How Much do Passwords Cost your Business?

The cost of supporting password systems, including staffing and infrastructure, can be significant for today’s digital businesses

DMARC Will Not Make Email Secure

DMARC Will Not Make Email Secure

DMARC will make little, if any, difference in improving email security respecting phishing because DMARC inadequately addresses both the technical proficiency of dedicated threat actors and their tools of psychological manipulation.

Somebody Else's Security: Rethinking Cloud FUD

Somebody Else's Security: Rethinking Cloud FUD

The list of enterprise IT organizations who had their private data publicly exposed in 2017 because of misconfigured AWS S3 buckets is long.

Effectively Managing Mistrust for Optimal Cybersecurity

Effectively Managing Mistrust for Optimal Cybersecurity

It’s vital that businesses work together to share information to stay one step ahead of the ever-evolving threat landscape.

What’s Hot on Infosecurity Magazine?