Infosecurity Opinions

How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?
More and more enterprises are relying on third-party service providers

#HowTo Avoid Common Mistakes in Vulnerability Management
A successful vulnerability management program is all about the reduction of business risk

The Hunt for Effective Machine Learning in Security
The vast majority of today’s breaches root back to a failure of detection

Curbing Insider Insecurity
Cyber-criminals often weaponize ignorance in their attacks

Cloud Migration Makes an Old Data Security Problem New Again
The current push toward digital transformation can only exacerbate the problem

Fighting Fraud: Connecting the Dots with Data
Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor

SOC 1, 2, & 3 Audit Reports, and Why You Need One
A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work

Managing Non-Security Incidents with Security Tools and Policies
What happens when an incident isn’t security related?

Equifax and Capital One: What Should We Learn?
Both were possible because of basic holes in the companies’ cyber hygiene practices

How Secure Is Behavioral Biometrics?
Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics

Defending in the Age of Advanced Insiders
Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack

Application Security Report: Urgent Need for Remediation
Remediation rates for security flaws have been gradually declining

We’ve Been Breached! What Do You Want From Us?
While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

#HowTo Develop a Detection and Response Strategy for Email Phishing
You need to get your employees on board to help prevent phishing

Why Understanding the User Experience is Essential to Good Security
Security and usability have traditionally been opposing concepts.

Bots x Humans: a Solution is Needed
Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

Your Employees are Taking Your Data
Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

Where Are All the Humans?
Separating hype from reality

Trust the Machine: How Security Analysts Can Relinquish Control
Instead of spending time undertaking mundane monitoring tasks, they need to embrace automated solutions

Thinking Outside the National Vulnerability Database Box
Why relying on a single source of the truth is not a good idea






















