Infosecurity Opinions

Managing Non-Security Incidents with Security Tools and Policies
What happens when an incident isn’t security related?

Equifax and Capital One: What Should We Learn?
Both were possible because of basic holes in the companies’ cyber hygiene practices

How Secure Is Behavioral Biometrics?
Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics

Defending in the Age of Advanced Insiders
Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack

Application Security Report: Urgent Need for Remediation
Remediation rates for security flaws have been gradually declining

We’ve Been Breached! What Do You Want From Us?
While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

#HowTo Develop a Detection and Response Strategy for Email Phishing
You need to get your employees on board to help prevent phishing

Why Understanding the User Experience is Essential to Good Security
Security and usability have traditionally been opposing concepts.

Bots x Humans: a Solution is Needed
Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

Your Employees are Taking Your Data
Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

Where Are All the Humans?
Separating hype from reality

Trust the Machine: How Security Analysts Can Relinquish Control
Instead of spending time undertaking mundane monitoring tasks, they need to embrace automated solutions

Thinking Outside the National Vulnerability Database Box
Why relying on a single source of the truth is not a good idea

How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats
The threat landscape is changing, but so is the security tools market

Securing Linux Systems in a New Vulnerable World
Securing Linux-based systems and devices has become a pressing challenge for developers and device manufacturers

Is IAM a Pink Elephant in Businesses?
IAM programs should ensure the risk is clear to help clients build a complete, security-rich solution

How Smart are Smart Cities? Balancing Innovation with Privacy
The more connected devices a smart city employs, the greater the risk to individual privacy

#HowTo: Avoid Common Data Discovery Pitfalls
Avoiding common and foundational issues will allow organizations to maximize their investment in data discovery

Breaking Bad – Are You Ready to Lawfully Intercept TLS 1.3?
TLS 1.3 is more secure, offers faster handshaking with lower latency

Mind the Gap – Measuring the Skills of a Security Team
Until a technology audit is complete, CISOs are blind to the gaps in their organization’s armor






















