Infosecurity Opinions

Providing Cyber Defence Without Breaking The Bank
An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory

Collaborative Approaches to Security – Getting DevSecOps to Work
Continuous intelligence data can help make DevSecOps a reality

When Malware Returns: Beating the Silent System Killer
More than half of ransomware victims got hit a second (or more) time

Windows 7 is Ending -- Don't Put Yourself at Risk
With only two months until the end of life date, waiting to address the issue will only increase the risk to your business

Shining a Light On Shadow IT
What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists

Patch-Perfect, But Still Vulnerable
Vulnerability scanning is vital, but it’s no panacea

Can You Trust Your Own Code Anymore?
This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.

SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security
Unfortunately, many SaaS providers enable SSO only for “enterprise” customers

CISO - Don't Take it Personally But Make it Personal
You need a lot more than technical knowledge and the ability to design roadmaps and execute projects

Address New Risks Without Adding Complexity
There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise

Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You
The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs

Managed Security Services Shouldn’t Scare the SMB
The MSSP model is now in financial reach for the SMB

Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?
Is anti-virus facing the same future as the Okjökull glacier

Extending the “Circle of Trust” with Confidential Computing
When an application starts to run, its data is vulnerable to a variety of attacks

How AI is Revolutionizing the Banking Sector
AI is becoming important for all businesses that rely heavily on data

#HowTo Migrate from SharePoint
Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system

Demand More Achievement in Cybersecurity
We need automated measures of effectiveness relative to operationalized cybersecurity

Why Password-based Single Sign-On is a Bad Idea
It all comes down to trust.

The Internet Is Growing, and so Is Your Attack Surface
A company’s attack surface sprawls across the open internet, making attack surface management a critical component

The Three Cyber Attacks Ruining Your Holiday Spirit
Three types of cyber attack to watch out for during the holiday season





















