Infosecurity Opinions

How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy
There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.

#HowTo Evaluate the Security of New Applications
Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable

Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?
In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN

Unified Identity: the Passport to Secure Personal Data Management
Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.

Data Scientists vs. IT: Aligning on Open-Source Security
The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.

How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?
The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively

Handle Misconfigurations in the Cloud
Cloud misconfiguration is becoming a prevalent source of risk for organizations.

Demonstrating Scientific Data Integrity and Security in the Cloud
Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security

Digital Identity Has Changed, and Enterprises Have Not Changed With It
As the number of enterprise apps has increased, so have new authentication methods and identity tools

The Online Harms Bill Cannot Wait
There is an urgent need to strengthen our defenses against this and other modern threats to keep children safe.

Coming out of the COVID Depression with a Cloud Security Strategy
All end users sent home from their private corporate networks are now “in” the cloud

CISO: Choose Your Weapon
The selection of security tools must provide the best security affordable and be manageable with the limitations of budget

#HowTo Improve the Security of Your Containers
How to embed security by design for containers.

What's Next After the Big 'Zero Trust' Welcome Back to the Office?
Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture

Is Critical Infrastructure Ready for Quantum?
Collectively, we want to realize all of the benefits of quantum without compromising security.

Misconfiguration on the Cloud is as Common as it is Costly
Remote work has opened profitable new horizons in cybercrime

Getting Your ‘Return’ to Work Strategy, Right
A robust data management strategy will affect our return to work, it will actually improve our working lives

Is Your Cloud Backup Ready to Handle a Crisis?
Keeping down cost and complexity in disaster recovery and business continuity

Securing Remote Operations with Digital Identity Management
Why identity management, on premise and as a service, is crucial to maintain remote worker security

Evolution to Becoming a Modern Day CISO
A CISO has to act as an educator, coaching and empowering both technology teams to understand the business goals






















