Infosecurity Opinions

Life as a Crowdsourced Hacker – Why You Won’t Become a Millionaire
It’s important to understand what you’re in for

Is This the Beginning of the End for Transport Layer Security Inspection Techniques?
The NSA makes it clear that TLSI does have advantages

Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand
Brands are unaware of who fourth parties are, and damage control becomes more challenging

Is TikTok a Cybersecurity Threat?
There are concerns about TikTok, so what can we do about them?

Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains
Attackers are increasingly looking to target people while they are travelling

Why Businesses Need to Re-Think Network Monitoring in 2020
The current approach to network security is significantly flawed on two counts

What Does the Hack Back Bill Mean to Your Business?
There is often vagueness in the language of new bills, especially when they are still in draft form.

How the Real Business Killer is Having Nothing on the Shelves
While ransomware is certainly a current problem for targeted businesses, downtime is a seasoned business killer

Call in the White Hats — It’s Time to Reboot External Testing
Businesses should be cycling through new testers every so often, so that attackers can push at different doors.

How Social Engineering is Changing the Insider Threat Game
Social engineering attacks ultimately lead to a type of insider threat known as user error

#HowTo Get the Most Out of Your Privileged Access Management Programme
Enterprises should put thought into architecting a PAM program with a risk-based approach

Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?
An advance on traditional segmentation that marries speed, innovation and improved security.

Is it Time to Resuscitate Prevention?
Why data breaches are only inevitable if we continue to think of them as the new normal.

Providing Cyber Defence Without Breaking The Bank
An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory

Collaborative Approaches to Security – Getting DevSecOps to Work
Continuous intelligence data can help make DevSecOps a reality

When Malware Returns: Beating the Silent System Killer
More than half of ransomware victims got hit a second (or more) time

Windows 7 is Ending -- Don't Put Yourself at Risk
With only two months until the end of life date, waiting to address the issue will only increase the risk to your business

Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists

Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea

Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.






















