Infosecurity Opinions

The CSI Effect Comes to Cybersecurity
If audit logs provide all the answers, why are we still regularly hearing about cyber-attacks

Put a PIN in it: Why the Password vs. PIN Debate is Irrelevant
The best solution: eliminating PINs and passwords altogether in favor of passwordless authentication

WannaCry – Please Meet #COVID19
Will the Coronavirus bring computer and medical science together?

Addressing Third Party Assessment Fatigue with Automation
Companies are suffering from assessment fatigue

Remote Workforce Security: Protecting People, Protecting the Enterprise
Ensuring a number of top security and management practices are in play will be essential if firms are to protect their people – and the enterprise itself.

Building an Elegant Data Governance Solution Takes People and a Plan
Organizations must be thoughtful in their approaches to security by building cathedrals of data governance — not just a few flimsy walls around their data kingdoms.

The Missing Link in Cloud Security
Cloud security isn't currently keeping up with the growth of cloud storage and adoption

Fraud Analytics and the Illusion of Asymmetric Insight
Fraud Detection belongs to the class of problems with ‘adaptive adversaries’

Safer Application Delivery with RASP
As network security measures have grown increasingly mature, the front line of this battle has moved to the application layer

#HowTo Mitigate Phishing Risks
Organizations turned to solutions, training, policies and techniques to protect themselves

Overconfidence and Under Education – Can Enterprises Ever be Secure?
Security professionals must get data management right, as a single mistake is all it takes to permanently affect brand equity

COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?
Amid national lockdowns and growing fear, governments are looking towards curbing the spread of the virus with unconventional means

If You’re in IT, Never Forget That You’re Also a Risk Manager
Every information technologist, whatever their specialty or skill set, is a risk manager.

Operationalizing NSA Guidance (or any Guidance, For That Matter!)
How does one operationalize guidance from the NSA and other elite security organizations?

Uncovering and Outlining Best Practices for Container Security
Best practices for container security, and secure approaches when it comes to control, visibility, monitoring, and configuration.

How Close Will We Get to an Autonomous SOC in the Next Decade?
This is what threat actors are counting on – amidst all this noise, their attempted incursion will be missed

How Are Digital Natives Shaping the Future of Data Privacy?
Digital natives have chosen to embrace technology as a permanent constituent of their way of life.

Respecting Data Privacy Rights Through Data Encryption
Data privacy must be a top priority for all organizations

Guarding Your Enterprise Cloud Phone System Against Cyber Attacks
You can only enjoy all the benefits of IP telephony if you have a strong defense system in place

Closing the Regulatory Loophole: Third Party Breach Notification
Ignoring third-party notifications of data breaches is a big problem for the breached company.




















