Opinions

square peg in a round hole / wooden block shapes toy
trojan horse malware virus binary by v graphix getty

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

5 things to look for in an XDR solution

The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.

Australia  >  Sydney  >  Streetscape / vanishing-point perspective / path / future / progress

3 security career lessons from 'Back to the Future'

You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.

cloud security data breach crime accessible

4 ways attackers exploit hosted services: What admins need to know

Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.

Binary Russian flag

SolarWinds hack is a wakeup call for taking cybersecurity action

Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.

data security / padlock / binary code / digital display

Data security vs data privacy – they’re not the same thing

Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Why 2021 will be a big year for deception technology

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.

Insider threats  >  Employees suspiciously peering over cubicle walls

Why you should consider outsourcing DLP

Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.

supply chain management logistics - ERP - Enterprise Resource Planning

Protecting the supply chain in an era of disruptions

Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

radar grid / computer circuits / intrusion detection / scanning

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.

cloud security ts

Developing a multicloud security strategy

Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]

Is Cybersecurity Awareness Month worth it?

Cybersecurity awareness month has never gained traction beyond academia and the public sector. It’s time for all parties to commit or quit.

CSO Executive Sessions [podcast logo]

Episode 14: How COVID-19 changed security priorities at Bristol Myers Squibb

Jerry Roberts, director of corporate security at Bristol Myers Squibb, joins host Bob Bragdon for a wide-ranging discussion on COVID-19's impact on security, the greatest cybersecurity challenges today, and how Roberts's 20-year...

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

CSO Executive Sessions [podcast logo]

Episode 13: Serving up a risk management culture at McDonald's

Podcast Episode 13: Tim Youngblood, corporate vice president and CISO of McDonald's, joins host Bob Bragdon to discuss how he approaches risk management and how the pandemic changed the security landscape.

CSO Executive Sessions [podcast logo]

Episode 12: Building board relationships

Podcast Episode 12: Mark Weatherford, chief strategy officer at the National Cyber Security Center, joins host Bob Bragdon to talk about building board relationships and why the single most important thing a CSO can do is inspire...

Load More