Infosecurity Opinions

COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?

COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?

Amid national lockdowns and growing fear, governments are looking towards curbing the spread of the virus with unconventional means

If You’re in IT, Never Forget That You’re Also a Risk Manager

If You’re in IT, Never Forget That You’re Also a Risk Manager

Every information technologist, whatever their specialty or skill set, is a risk manager.

Operationalizing NSA Guidance (or any Guidance, For That Matter!)

Operationalizing NSA Guidance (or any Guidance, For That Matter!)

How does one operationalize guidance from the NSA and other elite security organizations?

Uncovering and Outlining Best Practices for Container Security

Uncovering and Outlining Best Practices for Container Security

Best practices for container security, and secure approaches when it comes to control, visibility, monitoring, and configuration.

How Close Will We Get to an Autonomous SOC in the Next Decade?

How Close Will We Get to an Autonomous SOC in the Next Decade?

This is what threat actors are counting on – amidst all this noise, their attempted incursion will be missed

How Are Digital Natives Shaping the Future of Data Privacy?

How Are Digital Natives Shaping the Future of Data Privacy?

Digital natives have chosen to embrace technology as a permanent constituent of their way of life.

Respecting Data Privacy Rights Through Data Encryption

Respecting Data Privacy Rights Through Data Encryption

Data privacy must be a top priority for all organizations

Guarding Your Enterprise Cloud Phone System Against Cyber Attacks

Guarding Your Enterprise Cloud Phone System Against Cyber Attacks

You can only enjoy all the benefits of IP telephony if you have a strong defense system in place

Closing the Regulatory Loophole: Third Party Breach Notification

Closing the Regulatory Loophole: Third Party Breach Notification

Ignoring third-party notifications of data breaches is a big problem for the breached company.

Why Automation Holds the Key to Security Governance and a Culture of Collaboration

Why Automation Holds the Key to Security Governance and a Culture of Collaboration

How automation can help to unify security operations and open a dialogue with IT and other business stakeholders.

#HowTo Reduce Your Ransomware Attack Surface

#HowTo Reduce Your Ransomware Attack Surface

How can your organization significantly improve its chances at surviving a potential ransomware attack?

What’s Hot on Infosecurity Magazine?