Opinions

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
rfp write a proposal document contract signature deal agreement paper by extreme media getty

EU / European Union / GDPR data privacy, regulation, compliance

Global Data Protection and the right to be forgotten

Will the United States ever get its own privacy law?

aerial view of a network of roads

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

Cybersecurity awareness  >  A man with a binary blindfold finds his way through question marks.

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Autonomy and the death of CVEs?

Is the manual process of reporting bugs holding back the advent of automated tools?

A binary mask.

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Chains of binary data.

Regulatory landscape provides added incentive for enterprises to explore blockchain

Evolving security regulatory requirements should provide incentive for enterprises to explore what blockchain and other emerging technologies can do to strengthen their security programs.

keys / locks / security

Different conferences, common theme: How to best manage the disparate security solutions we’re using

We need to unite the different islands of security solutions in both the physical and cyber worlds to provide the best level of protection.

programming code development split screen display

Lessons learned through 15 years of SDL at work

In short? Security Development Lifecycle is all about the developers...

6 small business security

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

locked binary code and circuits

Why every business should consider ISO 27701 compliance for their vendors

The new standard provide a comprehensive set of controls for information security and the protection of personal information.

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Are you taking third-party risk seriously enough?

Because third parties are often responsible for data breaches, your internal security standards must extend beyond your borders to cover vendors and other external partners.

football

What Andrew Luck’s retirement can teach infosec leaders

Andrew Luck was an incredible quarterback who performed at very high levels despite numerous hits and injuries. At the age of 29, he walked away from the sport he loved and untold millions of dollars. This action, and the reaction...

iot security networking privacy

Data privacy in the IoT age: 4 steps for reducing risk

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company.

computer crime scene / hacked / infected / cybercrime / cyberattack

Why you need a cybersecurity incident response specialist

If your cyber insurance provider gives you the number of an incident response specialist, call them now. It will save time when an attack occurs.

network security / network traffic scanning

Why I’m not sold on machine learning in autonomous security

Some hard realities on the limitations of machine learning in autonomous netsec.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

secure system / network security policy management

How to become a cybersecurity RSO

How to build a reliable security program.

Load More