Infosecurity Opinions

Staying on the Cutting Edge of Cybersecurity
With edge computing, the application and its data, are distributed across multiple locations

Next Generation Cyber: Malware-Free Attacks
The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

System Hardening, and Why it’s Harder Than it Looks
The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

Pandora’s Box Is Open – AI Won’t Get Back In
The unfolding AI vs AI cybersecurity war

The Case for Security Instrumentation: Understanding and Measuring Cyber Risk
So what can CIOs do to better understand and address these gaps

Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation
We in IT are often guilty of conflating information with wisdom

Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector
By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

The Perils of Sneaking up the Supply Chain
Across the supply chain, partner security is a serious threat

Forever Day: The Threat that Never Ends
Even end-of-service-time equipment should get a patch if the company is able to provide it

Who’s Listening? A Call for Data Protection in Smart Devices
There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions
Why aren’t we combining TAP and Packet Broker functionality?

Mastering Cloud Management - Get Connected
Management in the cloud is arguably more important than on-premise

Authentication in the Age of GDPR
Are organizations adjusting to the new regulatory reality?

A Short History of EDR
The problems of EDR rose as you needed a skilled crew to manage these solutions

Radical Transparency and Zero Trust: Putting Concept into Practice
Visibility and trust are key to radical transparency

Should You Build Your Infrastructure to be Hit by a Cyber Attack?
How do you prepare for an attack you cannot stop? Try passive survivability

#HowTo Avoid Common Configuration Sins
Top five preventable configuration mistakes that can lead to a security breach.

SAST: Beginning at the End
The beauty and ugly side of static analysis

Exploring the Dark Net - Behind Enemy Lines
A strong understanding of operational security and acceptance of the risks associated with this type of research is key

Will “Sign in With Apple” Revolutionize Digital Identity?
The Apple credit card may be the first step in entering the identity space























