Infosecurity Opinions

Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?
Most companies are looking at cybersecurity solutions as a series of “bolt-ons” to the existing tech stack, instead of mapping out a comprehensive plan to help monitor the threat landscape and execute defense against an attack.

Essential Elements Needed for a Successful Threat Hunt
Threat hunting is vital to reduce the spread and effectiveness of attacks, but a large proportion of organizations are yet to engage in this type of activity.

From the Developer’s Perspective - Navigating the IoT Security Storm
In the IoT gold rush, and the race to realize the market’s potential, many companies have been deprioritizing security.

McDreary? The Future of Medical Call Centers & DDoS
A DDoS attack on a healthcare system can cause click-to-call features to be taken offline, and the implications can mean life or death.

Teaching Old Dogs New Tricks
Security teams need to gain an understanding of each application within their network and find out how it interacts with external entities.

Cloudy With a Chance of Cryptojacking
Cloudjacking is a growing trend: stealing processing and storage from someone else’s cloud account.

The Importance of Device Security in IoT Ecosystems
It is crucial that the resiliency of IoT devices are understood to prevent systemic security issues in the future.

Quantum: The future For Data Center Technology
How will advances in quantum computing affect the data center industry, and will these effects be positive?

What Europe Can do to Catch Dark Web Criminals
Could the Europol dark web investigation team succeed in pinning down underground attackers?

How Immutable Infrastructure Changes the Modern Security Mindset
How the rise of cloud-native applications are changing the security game.

Why Businesses Can't Ignore Crypto Agility
Crypto agility encompasses the range of policies, technology and initiatives organizations must dedicate themselves to in becoming resilient against quantum computing

Don't Undermine Data Security Investments by Dismissing Data Governance
Data security investments may be useless if poor data governance processes are in place.

Selling Servers by Proxy?
The second-hand server market is thriving but how do you get the most bang for your buck?

GDPR and California's New Privacy Could Mean Millions in Costs to Organizations
Data access requests could result in millions of dollars in operational costs for organizations that already face unprecedented fines in case of a security breach.

A Multi-Pronged Approach to Fighting Fraud with Fingerprinting and Cross-Device
Cross-device tracking is aimed at crossing the boundaries between a fraudster's individual devices and browsers.

Brand Reputation Through Automation
Firms that embrace cutting-edge application security solutions and automate procedures can stay one step ahead of the hacker

Fighting Fire with Fire: Why Proactive Security is so Vital for Businesses
More proactive form of defense is necessary and leverages Big Data analytics, network function virtualization, cloud scalability and penetration tactics to handle how cyber-criminals operate.

Say Goodbye to Passwords, the Future of Authentication is Here
The answer to passwords is zero login, using intricate and unique patterns.

Solving PII and Data Security Challenges in a new Compliant World
How could the Consumer Privacy Act impact your corporate strategy?

Real Security is a Question of Business Value
CISOs would be wise to ask about overall business value, not just technical value or a solution’s ROI.





















