Infosecurity Opinions

Is a Wiped Computer Truly Wiped?
Just because data appears to be gone doesn’t mean that it really is

Why SASE Can be Your Solution in a Time of Uncertainty
With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption

The Key to Successfully Managing Cyber Risk: Speed
No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.

RE: Thinking Email Security
Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed

The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives
Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance

Lessons From the World’s Crash-Course into Telecommuting During #COVID19
A few weeks into the Covid-19 disruptions, some first-hand observations from the field that apply to organizations globally

Zelle: A New Door Opens, But is Crime Walking In?
Zelle fraud is the fastest growing area of account takeover fraud in the U.S. banking sector.

#HowTo Secure Distributed Cloud Systems in Enterprise Environments
How can organizations secure distributed cloud systems while maintaining efficiency?

Steps to Implementing Voice Authentication and Securing Biometric Data
What are the steps to implementing a voice verification system, and how should the voiceprint data be secured?

Debunking Myths about Quantum Cryptography
Given how much data is stolen from U.S. industry and government, quantum could be a huge problem.

How Can Facebook Avoid the Wrath of the Regulator?
Facebook has faced multiple privacy criticisms, how can it improve?

Top Ways to Guard Against Work-from-Home Phishing Threats
Best practices that can help raise awareness of potential phishing techniques and other scams

The Equifax Saga: It Could Happen Again. Don’t Let It
Given the ongoing tensions between the US and China, it is unlikely that these government-run hacks will let up anytime soon

Power to the People
There is still a widespread assumption that secure perimeter and air gapped networks are enough to protect critical systems.

The Security Misconceptions of Apple
There are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms

The CSI Effect Comes to Cybersecurity
If audit logs provide all the answers, why are we still regularly hearing about cyber-attacks

Put a PIN in it: Why the Password vs. PIN Debate is Irrelevant
The best solution: eliminating PINs and passwords altogether in favor of passwordless authentication

WannaCry – Please Meet #COVID19
Will the Coronavirus bring computer and medical science together?

Addressing Third Party Assessment Fatigue with Automation
Companies are suffering from assessment fatigue

Remote Workforce Security: Protecting People, Protecting the Enterprise
Ensuring a number of top security and management practices are in play will be essential if firms are to protect their people – and the enterprise itself.






















