Infosecurity Opinions

Your Best Bet for a Safe Ride? Buckle up With a Best Practice Security Framework
How will the ‘Good Guys’ respond? In two ways: ‘Innovation and Frameworks.’

Finding and Mentoring Your Next Key Security Hire
Security talent - the hidden treasure trove of the next great security professional within your company.

Securing Backups in an Automated Data Protection System
Securing backups from ransomware and authorized access in an automated data protection system

#HowTo Put Together an Effective Information Security Policy
Do not think that anything is too obvious to leave out of your policy

Cybersecurity Must Do More Than Prevention, Real-Time Metadata Is the First Step
Rich metadata gathered from your network can capture more than 90% of the useful data that a full packet capture system would.

Using Graph Search Engines and High Performance Servers to Find Malware Patterns
Threat detection tools face formidable challenges, particularly when analyzing massive data sets

What the Post-API Economy Will Look Like
APIs are beginning to struggle with capacity and security issues

Consumer Apps: the New-Age Weapon
A mobile-centric zero trust approach also provides on-device detection and remediation of threats.

Rely on Continuous Improvement and Not Biases to Apply Cybersecurity Best Practices
How do we learn from our mistakes instead of continually repeating them?

A Digital Solution to Supply Chain Security
Why businesses should secure and manage third party access points by digitizing identity

Real ID Driver License Push Could Mean Real Headaches for US State Agencies
Real ID is one of the biggest data-gathering initiatives to take place recently

Software Security Witching Hour is Upon us
Which vulnerabilities are lurking in the shadows?

Effective Encryption Protects Data When it's Most Vulnerable
Remember that data exists in essentially three states: at-rest, in-motion, and in-use

How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?
More and more enterprises are relying on third-party service providers

#HowTo Avoid Common Mistakes in Vulnerability Management
A successful vulnerability management program is all about the reduction of business risk

The Hunt for Effective Machine Learning in Security
The vast majority of today’s breaches root back to a failure of detection

Curbing Insider Insecurity
Cyber-criminals often weaponize ignorance in their attacks

Cloud Migration Makes an Old Data Security Problem New Again
The current push toward digital transformation can only exacerbate the problem

Fighting Fraud: Connecting the Dots with Data
Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor

SOC 1, 2, & 3 Audit Reports, and Why You Need One
A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work























