Infosecurity Opinions

What Happens When You Give Excessive Access Rights to Employees
Strengthening your security with authentication and monitoring will keep your company’s data secure

#HowTo: Protect Against Remote Code Execution Attacks
Organizations must understand how their software runs and have the capability to stop any digression in milliseconds

Haugen Testimony Shows Cybersecurity Researchers Must Also Consider Mental Health
Cybersecurity researchers have the potential to improve the lives of tens of millions of people

The Three OT Security Dangers of R&R
Why upfront thought, strategic planning and a bit of patience will go a long way

4 Reasons Why Companies Fail to Fix Cloud Misconfigurations
Lack of cloud security knowledge, team alignment, visibility and speed explain why companies suffer misconfiguration breaches

Least Privilege Regaining Popularity
Why zero trust provides added scalability required to secure modern multi-cloud environments

Digesting the Alphabet Soup - Can EDR and MDR Co-exist?
How teams can best leverage a portfolio of detection and response strategies

#HowTo: Implement a Strong Cybersecurity Program for Small Businesses
How can small businesses develop cost-effective security programs

A Recipe for Destruction: Municipalities and Managing Cyber Risk
From Baltimore to Birmingham, Paris to Portland, municipalities are under attack

Implementing Zero Trust Principles in a Connected World
Foundational controls and measures determine if zero trust achieves security goals

The Journey to Zero Trust Begins with Identity
Identity is the fabric that ties the zero trust framework together

The Hard Truth About Network Security
Failing to secure identities and data in the public cloud will jeopardize an enterprise

#HowTo: Protect Your Organization's Root Accounts
As attacks on root account credentials continue to rise, organizations should take an active role in securing these credentials as much as possible

Ensuring Visibility and Data Access Control Across Clouds
Why businesses must adopt a delegated governance approach

Digitalization is Everywhere, So Why isn't Healthcare Keeping Up?
If the healthcare industry is to continue its rapid digitalization, it must use a fit-for-purpose solution

Team Sports in Cybersecurity: Collaboration Wins Gold
Helping organizations combat ransomware threats will give them the confidence to achieve gold-medal-worthy security

Thwarting Insider Threats, Ransomware and Protecting Water and Wastewater Facilities
WWS facilities deserve the most sophisticated defense the market offers

What is Identity and Access Management, and Why is it so important?
With IAM measures, organizations can prevent unauthorized access from online hackers and protect sensitive data

Simplifying Multicloud Security in a Cloud-Native World
Five steps organizations can take to simplify multi-cloud security

Building Privacy Into AI: Is the Future Federated?
Machine learning requires data to be stored on a centralized server, resulting in a plethora of privacy implications

























