Infosecurity Opinions

Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security
With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective

Behind the Scenes of Dark Net Market Closures and Their Consequences
What happens behind the scenes of Dark Net market closures and how these sites are being replaced by smaller, specialized stores.

Networking in the Time of COVID-19
Innovations have shifted enterprise technology out of on-premise hardware and onto cloud-based platforms

The Role of Containerization to Protect Enterprise Cloud Ecosystems
The security posture of unmanaged endpoints is below that of the organization’s managed devices

Remote Working: How To Protect Your Employees’ Mental Health
Coping with everything that’s happening and the shift to working in isolation is proving rather difficult for many workers.

We Don’t Need More Cybersecurity, We Need Better Cybersecurity
Why are data breaches becoming more frequent and more costly?

Why You Want to Fail a Red Team Exercise
Why failing a Red Team exercise is good and what happens afterwards is more important.

The Do’s and Don’ts of Building a Cybersecurity Program
Pointers on the do’s and don’ts of building an effective security program.

Bad UX Design Always Leads to Compromised Security
When you make things with the user in mind, you create experiences that are free of frustrations

Business as (un)usual: Communicating During a Pandemic, and Beyond
A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon

#HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering
Social engineering is also a matter of thinking out of the box

How the MSSPs Can Strive to be Detection Ninjas
An MSSP engineers for both situational awareness and situational consistency.

The Bigger Perimeter Picture of #COVID19
Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model

Reinventing the Role of the Tier 1 SOC Analyst
Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts

What Actually IS a Cyber Range, and How Has It Evolved?
A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how

Automating Security With Intelligence
Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.

Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments
Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.

Preparing for Tomorrow: Cybersecurity in a Remote World
The cost effective option of permanent remote working

Is a Wiped Computer Truly Wiped?
Just because data appears to be gone doesn’t mean that it really is

Why SASE Can be Your Solution in a Time of Uncertainty
With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption






















