Infosecurity Opinions

Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk

Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk

Regardless of what version of software you are on, there may be a zero-day that exists

Does Compliance Equal Security in the Age of Data Privacy?

Does Compliance Equal Security in the Age of Data Privacy?

Does compliance lead to security? That's the €20 million question.

The Journey to Data Integrity

The Journey to Data Integrity

How we can verify the authenticity of the things we see and hear, and what does this mean for data security?

Adding Tools to Tools

Adding Tools to Tools

How to combat insiders and external attacks with better authentication use.

Questioning the Machine

Questioning the Machine

Although IT security has often favored “black box” solutions, it is worth gaining guidance on the technical components of ML/AI.

Don’t Leave Your Doors Open - Secure Your APIs Now

Don’t Leave Your Doors Open - Secure Your APIs Now

Organizations fail to effectively safeguard APIs and often see an influx of security threats as a result.

The Benefits of Correctly Deploying a PKI Solution

The Benefits of Correctly Deploying a PKI Solution

Why and how PKI has remained a crucial part of an information security strategy.

Why You Should Implement Privacy by Design Before GDPR’s First Birthday

Why You Should Implement Privacy by Design Before GDPR’s First Birthday

How do you achieve privacy by design when the GDPR is unspecific on how to do it?

Making the Case for Cybersecurity Investment

Making the Case for Cybersecurity Investment

Business leaders are yet to fully embrace the value of cybersecurity.

Unraveling the Quandary of Access Layer versus Storage Layer Security

Unraveling the Quandary of Access Layer versus Storage Layer Security

How to ensure security and data access which is flexible enough for regulatory compliance.

Hacking Video Conferencing Platforms - The Next Big Thing?

Hacking Video Conferencing Platforms - The Next Big Thing?

Has society realized the vulnerability dangers within video calling and conferencing technologies.

Converged OT/IT Networks Introduce New Security Risks

Converged OT/IT Networks Introduce New Security Risks

At the core of the “Industry 4.0” trend, is the convergence of operations technology (OT) and information technology (IT) networks.

What’s Hot on Infosecurity Magazine?