Infosecurity Opinions

Developing Gold Medal-Worthy Protection Against Video Pirates
Developing a zero trust policy is key to an effective anti-piracy strategy

Adapting Data Security for a Permanent Hybrid Working Environment
The world has permanently changed, and organizations must adapt their security policy to match

Do Open-Source Supply Chains Leave Security Gaps in Your Organization?
If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase

Why Ransomware Protection Should Start with User Awareness
Humans are normally easier to hack than networks, so this is where defensive efforts should be focused

#HowTo: Improve Ransomware Resilience Across Remote Working Environments
There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces

Data Security in the Cloud: Adapting to a New Era of Modernization
Organizations must improve their cloud data security to avoid the risk of a substantial data breach

Better Accountability and Security Needed to Improve Government Aid
Improved accountability, security and identity verification is essential to get the most out of government aid programs

Aiming at a Moving Target: The Future of Security Teams in a Dynamic Environment
How allies can support security teams in fast-changing environments

A Presidential Wakeup on Cybersecurity
What should the private sector take from President Biden's most recent executive order on cybersecurity?

Paying a Ransom is Not an Option - So What Should Be Done Instead?
Organizations should implement measures to prevent as many ransomware infections as possible

Why SIEM is Not a Silver Bullet for Threat Detection and Response
Is SIEM really essential for threat detection and response?

Navigating the New Security Threats to Business Travel after COVID-19
Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them

#HowTo: Strengthen Supply Chain Security
Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations

Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question
Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum

Can You Identify and Defend Your Organization's Crown Jewels?
You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

Slow and Steady Wins the Race to the Cloud
Rushing through cloud migration will leave organizations more vulnerable to security breaches

Charting a Path Out of an Epidemic of Hidden Breaches
The cyber industry needs to get better at detecting and preventing hidden breaches

Considerations When Sharing Information with an AG's Office
What are the risks associated with producing info to a state AG?

Why Businesses Must Diversify Their Tech
In light of the widespread website outage last months, should organizations look to diversify their tech providers?

#HowTo: Approach Budgeting as a CISO
CISOs need to assess how security can contribute to business objectives to manage their budgets


























