Opinions

avast security pro for mac icon

Law enforcement uses anti-virus software to recover suspect's web history

Let’s mainstream the idea that privacy is almost impossible in the face of digital forensics. Avast AV leaving behind a private browsing database, is a shocking illustration of this.

guardians

Do you know who the new Guardians of the Galaxy are? It’s the morally upright CISOs

The digital consumer’s new best friend in large enterprises is the CISO – the custodians of the enterprise assets are now expanding their vision to include your and my data (at least the morally upright and forward-thinking ones)

3 legal law books

Insider threat legalese

Understanding your lawyer’s perspective on insider threats...and three suggestions to help start the conversation.

Computerworld - Scary Tech [Slide-03] - Facial recognition systems reporting to secret govt agencies

Protecting trade secrets: technology solutions you can use

The fourth and final part of a series on stopping trade secret theft in your organization.

enhancing ddos defenses with a web application firewall

Your cache is exposed

On February 28, Akamai recorded a 1.35 Tbps DDoS attack driven by a relatively new vector, memcached reflection. Memcached can have an amplification factor of roughly 500,000 times larger than the initial query, which allows small set...

security map digital encryption identity

From NSTIC to improved federal identity, credential and access management

OMB’s ICAM policy change leverages NIST’s Digital Identity Guidelines permitting the use of non-PIV, AAL 3 credentials for logical access, and tasks agencies to accept federated credentials for consumers conducting transactions online....

locked binary code and circuits

Why organizations need business-centric data protection

A data protection team can help your enterprise take the best steps towards reducing the business risks and data breaches.

people search find locate

How to hire the right analysts for your intelligence program

As someone who’s been deeply involved in virtually every aspect of hiring and job-seeking in security and intelligence, I can attest firsthand that while the process is rarely easy, it’s worth the effort.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

cloud security ts

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

hunting and monitoring security threats

How can SOC analysts hunt more efficiently? By not hunting

To win the battle against today’s sophisticated cyber threats, security analysts must disrupt a kill chain or lateral movement attack early in the process. Achieving success requires pinpointing the real threat amidst a never-ending...

credit card fraud

Without the right data, CNP fraud protection could be out of reach

Capturing and analyzing your sales and fraud data gives your ecommerce business real-time, dynamic information that helps you keep pace with rapid changes in the way fraudsters operate. Without this information, your fraud prevention...

whyhpcmatters frauddetection 1000

Cross-channel fraud detection

How performing behavioral analysis across silos can help detect sophisticated attacks.

security

Bridging the realms between cyber and physical security

Can there be better automated incident response for physical security?

green army soldier on a laptop keyboard

For endpoint security, trust but verify

Your organization might eventually fall victim to a data breach but creating checks and balances to maintain a layered data security approach can help you come out the other side with fewer losses.

security threats and vulnerabilities

It's only intelligence if you use it

Threat intelligence can be valuable, if you actually have it and you’re prepared to make use of it.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

girl hands privacy stop

Can we use a social media model to improve privacy attitudes?

The advent of social privacy.

login password - user permissions - administrative control

Turbo-charging your single sign-on solution

A comprehensive privileged password manager fills the SSO gaps and boosts overall data security.

Load More