Infosecurity Opinions
How to Keep Your CMS Safe and Secure
Unless properly secured, a CMS can open the door to bad operators
Only More Secure Coding Can Protect the Software Supply Chain
How developers can build more secure coding and increase industry awareness of the issue
California's Child Privacy Protections Could Be Thorn in Stalkerware's Side
California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat
Why the Password Is Not Dead
Why passwords are here to stay as the core of personal digital security
European Commission Acknowledges the Evolving Threat Landscape
Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more
#HowTo: Build Awareness and Best Practices into Your Company and Development Culture
How can organizations change security from a defensive tax model to an offensive mode?
Protecting the Three Dimensions of the Data Lifecycle
To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle
Solving the Gen-N Security Dilemma
The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks
#HowTo: Eradicate Plaintext Data Breaches
Organizations that encrypt everything can protect sensitive information even in the event of a data leak
#HowTo: Protect Your Organization From the Increasing Threat of Ransomware
Organizations need to implement stronger cyber-defenses to tackle threat of ransomware
Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools
Organizations need to find a way to capture the real value of their tools and metrics
Compete to Communicate on Cybersecurity
As tech firms compete to offer software at lowest prices, communications around cybersecurity should be an imperative
The New Era of Cyber-Attacks - Who is Most at Risk This Year?
Cyber-attacks are constantly evolving, and so are the actual targets of these attacks
#HowTo: Launch a Remote Incident Response
Remote working has changed how incident response teams are able to respond to security incidents
What the War in Ukraine Means
The war in Ukraine has ramifications, including widespread use of crypto and Russia gaining unfettered access to source code
Preparation Includes Understanding Your Battlefield
Nations should review their cybersecurity strategies now so their actions aren’t merely reactionary
Why Relying on AI for Automated Detection and Response is Dangerous
Only a human and machine collaboration enables companies to conduct simpler, faster and more accurate security investigations
The Rising Threat of Apps in the World of SaaS Platforms
While marketplaces for third-party apps on platforms like Zoom and Slack expand, security solutions aren't keeping up
#HowTo: Keep the Benefits of Zero Trust
A flexible zero trust-based approach is crucial as cyber-attacks rise
Will FIDO Replace OTP Multi-Factor Authentication?
Organizations should implement authentication schemes that offer better security and login experience