Infosecurity Opinions

Leveraging the Biometrics Ecosystem to Improve Cybersecurity
To properly leverage biometrics, you should understand elements that make it a powerful tool

Failing to Accept Human Nature Makes for Shoddy Cybersecurity
In the worst instances, unwittingly falling victim to a piece of malware could cost you your job

The Value of Predictive Email Security
Threat prediction can help businesses use data to prepare for what the next attack will look like

Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do
Achieving risk management goals will not improve your risk posture

Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet
By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm

Before Blaming Hackers, Check Your Configurations
Default SaaS settings often weigh easy access and usability over better security.

Tactics to Go Fully Secure in the Cloud
The best ways to beef up cloud security posture and set yourself up for success

Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations
Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process

Actions After you Find the Network Anomaly
Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning

Months After the US Government Shutdown, Cybersecurity is Still Suffering
Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

An Incident Response Walkthrough - Why is Process so Important?
How unusual activity on a laptop turned into a lesson on incident response

Reduce Security Complexity for Cloud Architectures
Threats that target public clouds require a different type of insight and action

Can You Trust Your AI?
Evaluating Machine Learning algorithms in practice

Illuminating the Dark Web
Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

Whose Team Is Artificial Intelligence On: The Corporations or Hackers?
As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

Open Source Tools Provide Low-cost Development Options for Cyber-criminals
Tools openly available to researchers are also available to those with more malicious intent

Cyber Attackers and IT Admins: Twins Separated at Birth
The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?
Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

The Threat Hunting Architecture
Threat hunting is the proactive process of looking for signs of malicious activity

Supply Chain Attacks: When Things Go Wrong
How supply chain attacks have leveraged the weakest links in security























