Infosecurity Opinions

Can You Trust Your AI?
Evaluating Machine Learning algorithms in practice

Illuminating the Dark Web
Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

Whose Team Is Artificial Intelligence On: The Corporations or Hackers?
As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

Open Source Tools Provide Low-cost Development Options for Cyber-criminals
Tools openly available to researchers are also available to those with more malicious intent

Cyber Attackers and IT Admins: Twins Separated at Birth
The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?
Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

The Threat Hunting Architecture
Threat hunting is the proactive process of looking for signs of malicious activity

Supply Chain Attacks: When Things Go Wrong
How supply chain attacks have leveraged the weakest links in security

Fast and Furious Phishing Attacks – The Race Against Time Matters
The race against time matters when defending against phishing attacks

Double Edged Sword of Secure Traffic
The positive and negative aspects of encrypted traffic

Homomorphic Encryption for Secure Elastic Data Stream Processing
How Fully Homomorphic Encryption can aid your cloud security

Debunking the Discourse Around Cloud Security
A widespread embrace of the cloud has brought benefits for collaboration and communication.

Why Third-Party Risk Assessment must be an Ongoing Process
As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk

The Changing Structure of Cybersecurity Teams
For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground

Robots vs False Positives: AI is Future Protection for Applications and APIs
Are the tools and processes we rely on leaving us vulnerable?

The Deal with Quantum Computing and Cryptography
Quantum computing continues to heat up as one of the major battlefields for security

Efficient Steps Toward a Successful PAM Implementation
How to ensure a successful privileged access management implementation

How Forgotten Legacy Systems Could Be Your Downfall
With end of support for Windows 7 announced for January, will we see more vulnerable networks?

Is your DDos Mitigation Strategy Terabit-Proof?
Larger and stronger DDoS attacks require a new approach to mitigate them

Explaining the Breakout Success of the NIST Cybersecurity Framework
The motivations and development that made the NIST Cybersecurity Framework a reality





















