Infosecurity Opinions

Call in the White Hats — It’s Time to Reboot External Testing
Businesses should be cycling through new testers every so often, so that attackers can push at different doors.

How Social Engineering is Changing the Insider Threat Game
Social engineering attacks ultimately lead to a type of insider threat known as user error

#HowTo Get the Most Out of Your Privileged Access Management Programme
Enterprises should put thought into architecting a PAM program with a risk-based approach

Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?
An advance on traditional segmentation that marries speed, innovation and improved security.

Is it Time to Resuscitate Prevention?
Why data breaches are only inevitable if we continue to think of them as the new normal.

Providing Cyber Defence Without Breaking The Bank
An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory

Collaborative Approaches to Security – Getting DevSecOps to Work
Continuous intelligence data can help make DevSecOps a reality

When Malware Returns: Beating the Silent System Killer
More than half of ransomware victims got hit a second (or more) time

Windows 7 is Ending -- Don't Put Yourself at Risk
With only two months until the end of life date, waiting to address the issue will only increase the risk to your business

Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists

Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea

Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.

SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security
Unfortunately, many SaaS providers enable SSO only for “enterprise” customers

CISO - Don't Take it Personally But Make it Personal
You need a lot more than technical knowledge and the ability to design roadmaps and execute projects

Address New Risks Without Adding Complexity
There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise

Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You
The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs

Managed Security Services Shouldn’t Scare the SMB
The MSSP model is now in financial reach for the SMB

Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?
Is anti-virus facing the same future as the Okjökull glacier

Extending the “Circle of Trust” with Confidential Computing
When an application starts to run, its data is vulnerable to a variety of attacks

How AI is Revolutionizing the Banking Sector
AI is becoming important for all businesses that rely heavily on data




















