Getting ready for digital transformation: The biggest cybersecurity challenges

Digital transformation (DX) is becoming the largest driver of new technology investments and projects among businesses and IDC forecasts that global spending on DX will reach $1.18 trillion in 2019. But DX efforts come with many challenges that need to… Continue reading Getting ready for digital transformation: The biggest cybersecurity challenges

Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Historically, security teams and tools have used IP addresses to define their targets and scopes. But in a world where applications and networks are increasingly cloud-hosted or integrated with third-party services, IP addresses alone aren’t enough to … Continue reading Is your perimeter inventory leaving you exposed? Why it’s time to switch from IP to DNS

Five ways automating IAM saves you money

Identity is the foundation of security, so a robust automated identity and access management (IAM) system is by far the best way to keep your company’s information safe. It’s also a great way to increase efficiency and save money. It’s no wonder so man… Continue reading Five ways automating IAM saves you money

On the path to Zero Trust security: Time to get started

No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question – what’s next? Vendors are quick to come to your aid with their latest, next … Continue reading On the path to Zero Trust security: Time to get started

How can we give cybersecurity analysts a helping hand?

It’s tough being a cybersecurity analyst these days. Over the last few years we have been repeatedly reminded of the challenge they are now facing, primarily through the steady stream of high-profile data breaches that have hit the headlines. In the la… Continue reading How can we give cybersecurity analysts a helping hand?

Identity theft victims could lead us to accept more security-improving friction

Far too many individuals who have never been victims of identity theft and financial crimes don’t understand how devastating those are to victims. “There are many victim services organizations that assist violent crime victims and the under… Continue reading Identity theft victims could lead us to accept more security-improving friction

CISOs: What would you do over?

Just after the new year I was catching up with a CISO over lunch in Pike Place Market in Seattle. We were reminiscing about how tough it is to get a security program up and running in the beginning. Pausing to dip his taco in the excellent house salsa,… Continue reading CISOs: What would you do over?

What does it take to be an infosec product strategist?

Choosing a security product that will best fit your organization’s needs is a challenge exacerbated by the “polluted, turbulent sea of ineffectual security products” that you’ll need to wade through in order to find the right an… Continue reading What does it take to be an infosec product strategist?

Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack … Continue reading Security spring cleaning: 5 tips for tidying up network safeguards

WhatsApp flaw used to install spyware by simply calling the target

A security vulnerability in the popular Facebook-owned end-to-end encrypted messaging app WhatsApp allowed attackers to install spyware on smartphones without any user interaction, Financial Times has reported. Exploitation of the flaw could be trigger… Continue reading WhatsApp flaw used to install spyware by simply calling the target