Infosecurity Opinions

Armoring the VDI to Protect Business Critical Applications and Data
VDI platforms provide secure remote access for enterprises, but they are not foolproof if the devices used to access them are unmanaged

#HowTo: Secure Your Business with Smart Spending
Organizations should take a more strategic approach to security spending in the current threat landscape

Ransomware: Survive by Outrunning the Guy Next to You
How can orgs avoid incidents like the recent ransomware attack on a US pipeline?

Governments and Organizations Can’t Ignore Threats Posed by Disinformation
How can governments and businesses combat the scourge of disinformation online?

Top Five Challenges of Building an Identity Governance Strategy
How can orgs build an effective identity governance strategy?

Avoid Being a Headline: Not all Domain Registrars are Created Equal
Amid third-party security threats, brands need to look carefully at their domain registrars

Can Organizations Ever Reach a State of Zero Trust?
Zero trust is not a security solution - it's a state of mind

#HowTo: Identify and Appoint the Right Security Partner for Your Organization
What considerations should orgs make when deciding whether to work with a security partner?

US Supreme Court Rules on Key Software Development Practice
What are the ramifications of the recent supreme court ruling in the Google v Oracle case?

#WorldPasswordDay 2021: Why Waving Goodbye to Passwords is Still the Best Password We Can Use This Year
Has the time come to say goodbye to passwords?

The 2021 Cloud Native Landscape
Security pros must remain aware of new trends in the cloud native environment

Testing Cyber-defenses: Does the ‘New Normal’ Mean We Need to Up the Stakes?
Do orgs need to ramp up cybersecurity testing practices in the post-COVID world?

Businesses Must Secure Their Devices Now to Safely Embrace Arrival of Hybrid Working
Businesses must adapt their security structure to enable a hybrid model of work

#HowTo: Leverage Existing ICS Security Investments to Effectively Reduce Cyber Risk
When your cybersecurity budget is slim and your team petite, how can you implement the required level of cybersecurity?

Three Questions to Consider to Help Mitigate Against Supply Chain Attacks
How should orgs assess current approaches to mitigate against supply chain attacks?

Taxed and Hacked: How Your Company Could Be at Risk This Tax Season
What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?

Outlier Detection Techniques for Fraud
Data science techniques can help detect credit card fraud

What if we Gave Users Control of Their Own Digital Identity?
How can users be put back in control of their digital identities?

Personal Security IS Enterprise Security
Helping employees stay safe in their personal lives will translate into work

#HowTo: Protect Your Employees from Data Loss
How should orgs tackle insider risk amid the shift to remote working?
























