Infosecurity Opinions

Stop Throwing Spaghetti at the Wall
The SOC Visibility Triad signifies a massive paradigm shift in cybersecurity

Bluetooth Hacks Keep Evolving, Will Your Cybersecurity Strategy?
Is the concern about connected security in the office being overhyped?

Security is Only as Strong as the Weakest Link
What if the weak spot was in the foundation to which the chain was connected?

Keeping SOC Costs Down While Improving Security – Is it Possible?
If the personnel just aren't there, what's a SOC to do?

Plugging Third Party Data Leaks
Explosion in the use of cloud-based applications has increased the number of third parties holding a company’s data

The Catch 22 Scenario for GDPR
The process for enabling consumers the right to access their data is still ad-hoc for many organizations

Make it So: How Intent-Based Network Security Accelerates the Enterprise
How organizations can realize the benefits on IBN across their complex, hybrid networks

Your Best Bet for a Safe Ride? Buckle up With a Best Practice Security Framework
How will the ‘Good Guys’ respond? In two ways: ‘Innovation and Frameworks.’

Finding and Mentoring Your Next Key Security Hire
Security talent - the hidden treasure trove of the next great security professional within your company.

Securing Backups in an Automated Data Protection System
Securing backups from ransomware and authorized access in an automated data protection system

#HowTo Put Together an Effective Information Security Policy
Do not think that anything is too obvious to leave out of your policy

Cybersecurity Must Do More Than Prevention, Real-Time Metadata Is the First Step
Rich metadata gathered from your network can capture more than 90% of the useful data that a full packet capture system would.

Using Graph Search Engines and High Performance Servers to Find Malware Patterns
Threat detection tools face formidable challenges, particularly when analyzing massive data sets

What the Post-API Economy Will Look Like
APIs are beginning to struggle with capacity and security issues

Consumer Apps: the New-Age Weapon
A mobile-centric zero trust approach also provides on-device detection and remediation of threats.

Rely on Continuous Improvement and Not Biases to Apply Cybersecurity Best Practices
How do we learn from our mistakes instead of continually repeating them?

A Digital Solution to Supply Chain Security
Why businesses should secure and manage third party access points by digitizing identity

Real ID Driver License Push Could Mean Real Headaches for US State Agencies
Real ID is one of the biggest data-gathering initiatives to take place recently

Software Security Witching Hour is Upon us
Which vulnerabilities are lurking in the shadows?

Effective Encryption Protects Data When it's Most Vulnerable
Remember that data exists in essentially three states: at-rest, in-motion, and in-use























