Infosecurity Opinions

How AI is Revolutionizing the Banking Sector
AI is becoming important for all businesses that rely heavily on data

#HowTo Migrate from SharePoint
Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system

Demand More Achievement in Cybersecurity
We need automated measures of effectiveness relative to operationalized cybersecurity

Why Password-based Single Sign-On is a Bad Idea
It all comes down to trust.

The Internet Is Growing, and so Is Your Attack Surface
A company’s attack surface sprawls across the open internet, making attack surface management a critical component

The Three Cyber Attacks Ruining Your Holiday Spirit
Three types of cyber attack to watch out for during the holiday season

Calculating the True Cost of a SOC
Under-staffed IT and security teams can create more security risk than most companies realize.

Expanding Biometric Use in Government
Biometrics, similar to passwords, PINs and bankcards, are a credential

Illuminate Dark Data and Avoid Severe Security Risks
Nearly 90% of all data is dark, meaning it’s sitting unused by the organizations that collect it.

A Tricky Transition: Why Organizations Struggle with Secure, Multi-Cloud Migrations
On average, they are leveraging nearly five clouds.

Identifying and Defending Against Harmful Content
‘Not Safe For Work’ content is a more prevalent and complex issue than ever before.

Risk in Retail: Staying on the Right Side of the Headlines
How can retailers survive in a connected and risky world?

A Familiar Foe — Preventing Ransomware’s Resurgence
For hackers able to identify and infiltrate systems that are lagging behind, however, the payday is still high

Addressing the C-suite Access Issue
The higher up the individual, the bigger the risk

#HowTo Have Better Open Source Security for the Financial Services Sector
How financial services organizations can use more open source code risk-free

Winning the Cybersecurity Battle with Open Networking
The best defense policy is one that is pre-emptively implemented before any attack

Why I Don't Blame Boards for Underinvesting in Cybersecurity
Security professionals need to present boards with something much more arresting: metrics and indicators

We’re Going to Need a Better Plan
Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.

Combining Threat Playbooks with AI to Stop Cyber-Criminals
Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence

A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth
Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.






















