Infosecurity Opinions

The Mobile Underworld: How Businesses Are Attacked in Murky Parts of the Mobile App Ecosystem
How attackers can imitate your company with a rogue mobile app

Why Automation Holds the Key to Security Governance and a Culture of Collaboration
How automation can help to unify security operations and open a dialogue with IT and other business stakeholders.

#HowTo Reduce Your Ransomware Attack Surface
How can your organization significantly improve its chances at surviving a potential ransomware attack?

Working from Home Policies and the Future of Cybersecurity
The COVID-19 epidemic has re-enforced that the future of cybersecurity is in the cloud

A Cybersecurity Culture Score
Looking at the Business Model for Information Security, a way of thinking about information security in a holistic way.

The Future for Network Security: What Does SASE Bring to the Table?
As part of an overall digital business transformation, organizations will look to SASE

Keeping Data Secure in the Always-On World
Despite the proliferation of sophisticated cyber breaches, always-on availability is a consideration many IT leaders are not prioritizing

Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough
The most frustrating part of Wawa’s story? That it could’ve been prevented

A First-Class Feature: Security in the Era of Worker Data
As industries adopt data-rich wearable technologies, it’s imperative that security be prioritized as a first-class feature.

Push Security to the Edge: Overcoming Edge Computing Challenges
The best attacks are the ones you never see coming

Time to Stop Overlooking DNS Security
For the internet to be secure, DNSSEC should be widely deployed

Why SSL Encryption Will not Become a Victim of its Own Success
This level of security is an essential feature of online data exchange

Detecting Spear Phishing: Sophisticated Attacks Require a Sophisticated Defense
Many email security approaches now rely on machine learning, in addition to heuristics.

#HowTo Be Sure You Choose a Safe and Secure Hosting Provider
Six data security questions to ask when review and choose your next hosting provider

A Siri for Network Security: How Chatbots can Enhance Business Agility
The benefits of network security chatbots in saving time and accelerating processes

How the Cloud Complicates the Digital Crime Scene
In short, it is very similar to any other form of forensics

Educating Non-Technical Employees on the Risks Of Shadow IT
Shadow IT is becoming more of a prevalent risk for a few reasons

Ransomware is Putting Smart City Aspirations on Notice
Current cybersecurity solutions are not able to cost-effectively scale in order to fully monitor the burgeoning networks.

Insecure Loyalty Points are the Dark Web’s New Currency
Businesses need to treat their loyalty point schemes more like bank accounts

A Risky Misconception – Understanding Supplier Risk Profiles
We’ve identified 5 steps to help companies mitigate the risk caused by outside suppliers.























