Infosecurity Opinions

Navigating the Murky Waters of Data Policy Innovation in 2019 and Beyond
Which barriers does data privacy face in this new year?

The Retail Industry’s Third-Party Data Breach Problem
Some of the world’s top brands still suffer data breaches as they do not address third-party service threats.

Japan and the EU Create a Free Flow of Data
How the adequacy decision between Japan and the EU will enable and affect data security.

Receiving Tons of Unexplained Out-of-office Emails?
How you can fall victim to an email account takeover, and what the indicators are.

Accessibility Trumps Security in the Battle Between Authentication Alternatives
We have the technology to make authentication more secure, so why do we insist on outdated, tired and inferior solutions?

Why Open Port Monitoring is Both an Essential and Flawed Security Control
Checking for open ports sounds simple, but the reality is way off.

Is Security The Loser As Open Banking Takes Hold?
What security challenges does PSD2 and open banking present?

Safely Stretching Resources to Meet Industrial Cybersecurity Needs
ICS leaders turn to specialized skillsets and advancements in secure remote access to further their industrial cybersecurity.

Suspending Privacy Shield? A Look at What's At Stake
Market demand for Privacy Shield is soaring while being under review by the European Commission.

Would Cybersecurity Professionals Make the Best DPOs
Could a cybersecurity professional have the skills to become a data protection officer?

Fingerprint Sensors are Not the Guarantee to Privacy
How fingerprints are being used for authentication, but may not be flawless.

How Threat Actors Abuse Legitimate Sites to Bypass Security Defenses
Website abuse techniques offer several benefits to attackers

Debunking Common Misconceptions about Third-Party Risk Management
Debunking several misconceptions about managing a third-party risk program have emerged in recent years.

Managed Threat Hunting Fills a Critical Gap
Can managed threat hunting get you in the proactive detection game?

Co-operate with the State: Altering Approaches to Intelligence-Sharing in Security
A more organized, combined approach is needed to bring about collective digital security – one that pools together the resources and knowledge we have at our fingertips to assess the current threat environment.

Get Rid of your Database Security “Hairball” with Database Security 2.0
How SaaS, AI/machine learning, and unified database visibility play a critical role for achieving comprehensive security in today’s on-prem and multi-cloud database environments.

Protecting Private Data in Virtual Environments with New Encryption Approaches
New approaches for encryption protection in virtual environments.

Securing Against Developer Pressure
It is no longer acceptable to consider any connected software a finished product.

Strengthen Data Breach Defenses with Emulation Assessments
With data breach emulation, assessments are based on the use of actual attack components.

The Power of Quantum: Reshaping the Cybersecurity Landscape
Quantum computing promises medical breakthroughs, important scientific discoveries and key developments in manufacturing.























