Infosecurity Opinions

Thinking Outside the National Vulnerability Database Box
Why relying on a single source of the truth is not a good idea

How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats
The threat landscape is changing, but so is the security tools market

Securing Linux Systems in a New Vulnerable World
Securing Linux-based systems and devices has become a pressing challenge for developers and device manufacturers

Is IAM a Pink Elephant in Businesses?
IAM programs should ensure the risk is clear to help clients build a complete, security-rich solution

How Smart are Smart Cities? Balancing Innovation with Privacy
The more connected devices a smart city employs, the greater the risk to individual privacy

#HowTo: Avoid Common Data Discovery Pitfalls
Avoiding common and foundational issues will allow organizations to maximize their investment in data discovery

Breaking Bad – Are You Ready to Lawfully Intercept TLS 1.3?
TLS 1.3 is more secure, offers faster handshaking with lower latency

Mind the Gap – Measuring the Skills of a Security Team
Until a technology audit is complete, CISOs are blind to the gaps in their organization’s armor

AI Puts Voice Impersonation on Steroids – Why and How Organizations can Minimize the Risks
AI-generated voice impersonation is a reputational as well as a financial or security threat

When Seeing Isn’t Believing: Deepfakes in the Digital Age
Deepfakes are the new visual content taking the social media sphere by storm

As Attacks on Biometric Data Rise, Risk and Identity-Defined Security Become Paramount
Unlike passwords, it’s unchangeable data

Another Data Privacy Law? No Problem
The New York Privacy Act will be added to a long list of worldwide regulations companies must comply with, or face harsh penalties

What is Malware Flux and How Can You Avoid it?
Malware flux "hides" malware in two waves of a Trojan

Establishing Efficient Data Governance Processes to Add Business Value
An effective strategy for data governance will help IT and security teams to articulate the value of such a program to the C-Suite

Is Continuous Authorization the New Frontier in Enterprise Security?
Authorization is no longer a nice-to-have feature, it is an imperative

Debunking Five Myths about Zero Trust
Zero Trust's evolution over the last decade have created some misconceptions

#HowTo Combat the Insider Threat
Insider threats can be difficult to detect, and pose a threat that businesses struggle to address

What is the Right Response to the Extended PSD2 Deadline?
Retailers have been granted an 18-month extension for SCA compliance, delaying implementation to March 2021

Why Content Services Platforms Should Be ‘Need-To-Know’ Security Ready
Need-to-know security is an essential part of protecting sensitive enterprise information

The CFO’s Perspective: Steps to Quantifying Cyber Risk
A CFO's steps to better security decisions





















