Infosecurity Opinions

Forever Day: The Threat that Never Ends
Even end-of-service-time equipment should get a patch if the company is able to provide it

Who’s Listening? A Call for Data Protection in Smart Devices
There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions
Why aren’t we combining TAP and Packet Broker functionality?

Mastering Cloud Management - Get Connected
Management in the cloud is arguably more important than on-premise

Authentication in the Age of GDPR
Are organizations adjusting to the new regulatory reality?

A Short History of EDR
The problems of EDR rose as you needed a skilled crew to manage these solutions

Radical Transparency and Zero Trust: Putting Concept into Practice
Visibility and trust are key to radical transparency

Should You Build Your Infrastructure to be Hit by a Cyber Attack?
How do you prepare for an attack you cannot stop? Try passive survivability

#HowTo Avoid Common Configuration Sins
Top five preventable configuration mistakes that can lead to a security breach.

SAST: Beginning at the End
The beauty and ugly side of static analysis

Exploring the Dark Net - Behind Enemy Lines
A strong understanding of operational security and acceptance of the risks associated with this type of research is key

Will “Sign in With Apple” Revolutionize Digital Identity?
The Apple credit card may be the first step in entering the identity space

Digital Transformation and IT – Customer Clarity, but IT Blindness
As digital transformation makes businesses more responsive to customer demands, so security has to follow

What’s Driving the Need for Automated Security?
How do developers keep up with the pace of agile?

Diving into IoT: What Works for Your Business?
When it comes to IoT, there is no one-size-fits-all approach

In the Gig Economy, Background Checks are a Thing of the Past
Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

Don’t be at Sea When it Comes to Protecting Against Mobile Phishing
Attackers are now targeting security padlocks and address bars on popular sites

From Shift Left to Shift Up: Securing Containers and Serverless Architectures
Security must also “Shift Up” to focus on protecting the application tier after deployment

Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data
63% of SMBs believing that cloud storage providers should do more to protect their data

Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan
Well managed data is easier to locate, utilize and update with the latest security policies























