Opinions

02 clicker
FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

teach train grunge abcs learn

5 cyber security basics you can't afford to ignore

Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack.

5 password best practices unique passwords authentication

The best password advice right now

Short and crackable vs. long, complex and prone to reuse? The password debate rages on.

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

flow of digital data through virtual data center servers

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

cloud security ts

Enhancing cloud security for AWS deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

cellphone tower

Can you hack me now?

How identity-based networking can protect your LTE connections from attack.

keys to access solutions answers open

Your gardener wants access to your house safe

What we would balk at in the real world, we give with impunity in our digital universe.

risk assessment - safety analysis - security audit

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

green bottle with money inside save message in a bottle

Getting the most out of your security budget

There may be no more pressing need in today’s online world than quality cybersecurity. With such a limited budget, it’s crucial to prioritize purchases that will give your organization the greatest return on your investment.

A traveller with suitcase looks at the horizon and the path ahead. / travel / adventure / beginnings

What the digital booking trend means for local travel attractions and fraud prevention

Online bookings of local tours, attractions and even dining have skyrocketed. Although this can be a great source of traffic and revenue for these local attractions, online payments fraud in this sector continues to rise and these...

aerial view of pentagon government security dv1282020

5 factors affected by disbanding the Defense Information Systems Agency

Government needs to make tough budgeting decisions, and closing agencies is up for debate. But cutting the Defense Information Systems Agency (DISA) could have a potential impact on national security.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

cloud security

5 tips for better cloud security

As cloud adoption soars to new heights, security standards have failed to keep pace. Organizations need to start taking responsibility for their own cloud security and these five practical tips will help.

eye security privacy time clocks deadline

Threat detection: it’s about ‘time’

Incident response is a slave to time. From time-to-detection through time-to-containment, time is the crucial factor when responding to any threat.

data analytics - statistical analysis - charts, graphs, strategy planning

User behavior analytics is not a silver bullet

The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior...

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

stolen credit card

In the new ecommerce fraud landscape, every vertical is now at risk

Fraudsters are not just targeting small merchants or inexpensive items anymore – virtually any vertical or product can be a worthwhile target for online fraud, and the losses could cause irreversible damage to a retailer’s bottom...

Load More