Infosecurity Opinions

Batten Down the Hatches against Crypto-Mining Pirates

Batten Down the Hatches against Crypto-Mining Pirates

Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.

We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

Virtual Patching is emerging as a solution to the problem of too many unapplied software fixes.

How Much do Passwords Cost your Business?

How Much do Passwords Cost your Business?

The cost of supporting password systems, including staffing and infrastructure, can be significant for today’s digital businesses

DMARC Will Not Make Email Secure

DMARC Will Not Make Email Secure

DMARC will make little, if any, difference in improving email security respecting phishing because DMARC inadequately addresses both the technical proficiency of dedicated threat actors and their tools of psychological manipulation.

Somebody Else's Security: Rethinking Cloud FUD

Somebody Else's Security: Rethinking Cloud FUD

The list of enterprise IT organizations who had their private data publicly exposed in 2017 because of misconfigured AWS S3 buckets is long.

Effectively Managing Mistrust for Optimal Cybersecurity

Effectively Managing Mistrust for Optimal Cybersecurity

It’s vital that businesses work together to share information to stay one step ahead of the ever-evolving threat landscape.

Undermining Crypto-Threats

Undermining Crypto-Threats

Cryptomining has the potential to be as big a threat a ransomware, and it is harder for law enforcement to track the perpetrators.

Establishing Trust in a World without Boundaries

Establishing Trust in a World without Boundaries

This brave new world has new security challenges, necessitating a new strategy based on a perimeter-less, “zero-trust” approach.

Protecting Privileged Identities: Why IAM starts with PAM

Protecting Privileged Identities: Why IAM starts with PAM

Like any good security measure designed to protect critical information assets, managing and protecting privileged accounts requires both a plan and an ongoing program

Bouncing Back from Cyber Attack

Bouncing Back from Cyber Attack

Knowing where to get started a cyber-attack specific disaster recovery plan is always half the battle..

Zero Trust: Method or Madness?

Zero Trust: Method or Madness?

Zero Trust is a method of security where the central premise is ridiculously simple: trust no one.

The Role of Automated Asset Management in Industrial Cybersecurity

The Role of Automated Asset Management in Industrial Cybersecurity

Without an up-to-date and accurate inventory of ICS assets, including the automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.

What’s Hot on Infosecurity Magazine?