Infosecurity Opinions

#HowTo Not Make Backups: Do You Really Want to Protect Your Data?
Although backups are a critical element of incident response, they can be used against companies unless set up properly.

Improving Email Security is About Disguising a Secure Solution as Email, Not Trying to Fix its Protocols
Typical email protocols lack a lot of features that are essential from a security and privacy perspective

VPN Split-Tunneling – To Enable or Not To Enable
How VPN split-tunneling can create additional risks and benefits to entities utilizing VPNs.

Cybercrime Has Undergone an Industrial Revolution – How to Keep Up
Knowing how cyber-criminals use the services can provide an understanding of the threats they’re up against.

Who Owns Responsibility for Industrial Cybersecurity?
Securing CNI is often considered to be a joint responsibility between the private and public sectors.

The New Normal: Working from Home and Extending Perimeter Defenses
Remote work has grown by 400 percent in the last ten years and enterprises should be aiming for Secure Access anytime, anywhere, from any device.

Launching a Vendor Risk Management Program with Limited Resources
With third-party data breaches affecting all organizations, a VRM program is necessary to help safeguard organizations from an attack.

Landmark International Data Transfer Case Boosts EU Data Privacy Laws
How a recent political precedent affects future data protection laws

Remote Work Highlights the Need For a People-Centric Approach to Cybersecurity
Humans are harder to protect than machines — but just as important

The Art of (Phone) War: How Consumers Can Fight Back When Phone Companies Sell Their Personal Data
How and why phone companies are selling consumer data along with tools and resources to fight back and protect customer privacy.

Getting Ahead of Cybersecurity Disasters
Steps to help you keep your data safe

#HowTo Secure the Supply Chain
Five best practices for third-party vendor risk and securing the supply chain

Using an Adversary to Calibrate Your Program
It’s time CISOs leverage the relative sophistication of threat actors and use it to base their security story

Patching Vulnerabilities in IoT Devices is a Losing Game
Why has IoT cybersecurity traditionally relied on vulnerability patching>

Trust But Verify - Mitigating Privilege Account Risks
By understanding how privilege access occurs, organizations can more easily identify a network compromise and act before a catastrophic breach

Biometrics: The Future of Payment Authentication
Biometric payment cards are currently in trial across some banks in Europe

Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?
Industry-wide initiative is a necessity to ensure hospitality corporates stand the best chance to succeed

Why Do Kubernetes and Containers Go Hand in Hand with Machine Learning?
Containers allow data to work on their Machine Learning and Artificial Intelligence programs and improve them significantly

Virtual Cybersecurity Professionals Needed During Times of Uncertainty
Virtual Cybersecurity Professionals are the latest trend in cybersecurity hiring

Too Many Vulnerabilities, Too Little Time
Why risk-based vulnerability management needs to be predictive























