Infosecurity Opinions

#HowTo Adopt an Identity-Centric Security Approach
A forward-thinking company uses an identity-centric security approach to reduce the risk of a breach or failed audit

The Secure SD-WANderful Approach to Securing Your Workers at Home and in the Office
Secure SD-WAN provides the scalability, performance, and security necessary to make sure this flexibility is a reality.

Redefine the Risk Dynamic Within Your Business to Enhance Innovation And Development
Redefine how your business sees risk, and create a predictable model for investing in risk-reduction that accelerates speed-to-market

Key Management with Acuity: On-Premises, Cloud, Hybrid
Sophisticated key management solutions are essential to any cryptographic operation

How to Organize Employees to Cooperate in Threat Mitigation
Cooperation is important for mitigating cybersecurity threats

Why Storytelling Should be at the Heart of Security Training
The answer to engaging awareness content lies in storytelling

It’s Time to Fight Back and Protect our Critical Infrastructure
We are still in the throes of a pandemic, but it should be an imperative to get your data back under control.

IoT Security: Everything Starts with Awareness #NCSAM
Is one month enough time to plant the right cybersecurity seeds and make an impact within the IoT community?

The Threat From Within – A Genuine Horror Story
Which steps you can take to ensure security doesn't give you a fright this Halloween

Security Threats Facing Universities
Universities weakened by COVID impact can be easy prey for cyber-attack; it’s time to fight back

The Case for a Federated Responsibility Model for Application Security to Power Secure DevOps
Centralized control model no longer applies to today’s software-defined world

Information Security in Agile Development
Changes to be made to support the transformation of software development within an Agile framework.

Why Does The Software Defined Perimeter (SDP) Matter?
Organizations using hosting options should use a VPN and SDP to ensure security and a positive user experience

#HowTo Enhance Borderless Networks with Cloud-Managed DDI #NCSAM
Flexible organizations require a flexible solution

Why Your CSPM Might Be Falling Short
Why the traditional CSPM model falls short within cloud-native organizations

CISOs: Here are the Cybersecurity Concerns Boards Really Care About
As companies tighten budgets going into 2021, it’s important to communicate security ROI in an understandable language

Account Takeover Risks of Small Businesses: How to Avoid Them
How to detect, and recover, from account takeover attacks

Is Encryption the Answer to Data Security Post Lockdown? #NCSAM
If businesses want to secure data on the move, it is essential that encryption and endpoint control is applied to all devices

Preventing Business Email Compromise Calls for Analyzing Email Language
Most email security tools are designed to look for the what and the who

Ripple20 Isn’t An Anomaly – IoT Security Is A Mess (Still) #NCSAM
Ripple20 isn’t the only IoT security fiasco, it’s just the latest





















