Infosecurity Opinions

Real Security is a Question of Business Value

Real Security is a Question of Business Value

CISOs would be wise to ask about overall business value, not just technical value or a solution’s ROI.

A Call to Action: Canada's Demand for Cyber Hygiene

A Call to Action: Canada's Demand for Cyber Hygiene

The new plan unveils how Canada will help businesses prevent and respond to attacks, while protecting its own infrastructure.

Staying One Step Ahead - Understanding Breaches to Beat Them

Staying One Step Ahead - Understanding Breaches to Beat Them

Without fully understanding the threats, how can businesses expect to prevent, or reduce the likelihood of breaches in the future?

Cybersecurity: A Big Deal in Mergers & Acquisitions

Cybersecurity: A Big Deal in Mergers & Acquisitions

In an M&A transaction, it is critical to understand the nature and significance of the risk profile in the organization’s network

The Reality and the Vision Behind Mobile Security Certificates

The Reality and the Vision Behind Mobile Security Certificates

By attaching a secure certificate to a mobile phone number, user identity can be confirmed to service providers via cryptographically secure “identity messages” in the form of a paired key over PKI.

The GDPR Aftermath: What Else Can be Done to Improve Data Security

The GDPR Aftermath: What Else Can be Done to Improve Data Security

GDPR is a step in the right direction for securing user privacy in an era of widespread information sharing.

How AI Can Tame and Control Shadow IT in the Enterprise

How AI Can Tame and Control Shadow IT in the Enterprise

The resulting blurring between personal and workplace IT functions has opened a Pandora’s Box of cybersecurity woes.

Dealing With Overlay Attacks: Adopting Built-In Security To Safeguard Mobile Experience

Dealing With Overlay Attacks: Adopting Built-In Security To Safeguard Mobile Experience

Overlay malware takes the form of a trojan, and is downloaded as a supposedly legitimate application from a legitimate website or app store.

Strengthening Your Digital Core

Strengthening Your Digital Core

If your digital core is weak, what gets thrown off is your organization’s ability to maintain operations, serve customers and generate revenue.

Halfway Through 2018, is This the Year of the Insider Threat?

Halfway Through 2018, is This the Year of the Insider Threat?

Insider threats range from unintentional errors and compromised credentials, to a lack of basic cybersecurity hygiene, all the way through to malevolent insiders.

The Dawn of a New Digital Era for Healthcare Organizations

The Dawn of a New Digital Era for Healthcare Organizations

With the NHS ready to adopt cloud technology, could this better protect UK healthcare?

The Two-Step Process to Fix the Internet's Identity Problem

The Two-Step Process to Fix the Internet's Identity Problem

Two steps to get over the internet's identity problem.

What’s Hot on Infosecurity Magazine?