Infosecurity Opinions

Digital Transformation and IT – Customer Clarity, but IT Blindness
As digital transformation makes businesses more responsive to customer demands, so security has to follow

What’s Driving the Need for Automated Security?
How do developers keep up with the pace of agile?

Diving into IoT: What Works for Your Business?
When it comes to IoT, there is no one-size-fits-all approach

In the Gig Economy, Background Checks are a Thing of the Past
Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

Don’t be at Sea When it Comes to Protecting Against Mobile Phishing
Attackers are now targeting security padlocks and address bars on popular sites

From Shift Left to Shift Up: Securing Containers and Serverless Architectures
Security must also “Shift Up” to focus on protecting the application tier after deployment

Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data
63% of SMBs believing that cloud storage providers should do more to protect their data

Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan
Well managed data is easier to locate, utilize and update with the latest security policies

Privacy and Data Protection in Multimedia Apps
The processing of sensitive data through multimedia apps poses significant risks to data security and privacy

Cybersecurity – It Takes an Engineer to Catch an Engineer
How to use cyber-criminal behavior pattern knowledge to our advantage

The Most Influential Security Frameworks of All Time
Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

Safety and Security in Industry 4.0 – Are You Ready?
A fundamental challenge remains about how advances should be secured

The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust
The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

Constant Visibility is Crucial to Enterprise Mobile Security
Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

Performance Anxiety and the Inability to Stop Access Threats
The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success
With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

Why the Real Estate Industry is a Prime Target for Attackers
Why are cyber-criminals so heavily targeting the real estate market?

Why Network Visibility is at the Heart of Digital Transformation
To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution

Governing Over Critical Data in the Internet of Things
What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?

The Three Hidden Dangers of Working With Third-Party Vendors
We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes























