GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can’t take it for granted: data breaches put us under fire constantly, revealing everything about us from logs and … Continue reading GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data, which sooner or later can be traced back to you. Related: The Facebook factor A few weeks back I intervi… Continue reading GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

BEST PRACTICES: 6 physical security measures every company needs

It has never been more important to invest in proper security for your business. Laws surrounding the personal data of individuals such as the General Data Protection Regulation (GDPR) put the onus on companies to ensure that both digital and physical … Continue reading BEST PRACTICES: 6 physical security measures every company needs

GUEST ESSAY: Repelling social engineering attacks requires shoring up the weakest link: humans

The problem with social engineering attacks is that they capitalize on the weakest link on any computer or network system: You! Avoiding social engineering attacks requires you to understand what they are and how they work. Related: Why diversity needs… Continue reading GUEST ESSAY: Repelling social engineering attacks requires shoring up the weakest link: humans

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at the end of the tunnel. Related… Continue reading GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

The cybersecurity talent shortage is here to stay. With an estimated 1.5-2 million unfulfilled cybersecurity positions, organizations are coming to terms with the fact that no amount of creative hiring initiatives will rid them of the need of figuring … Continue reading GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. The breach of some 30 computer… Continue reading GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

GUEST ESSAY: What your company should know about addressing Kubernetes security

Kubernetes is one of many key enabling technologies of digital transformation that has tended to remain obscure to non-technical company decision makers. Related podcast: Securing software containers Kubernetes is an administration console — an o… Continue reading GUEST ESSAY: What your company should know about addressing Kubernetes security

GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. This is referred to as ‘dwell time’, and a recent report from the Ponemon Ins… Continue reading GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

From a certain perspective, 2018 hasn’t been as dramatic a cybersecurity year as 2017, in that we haven’t seen as many global pandemics like WannaCry. Related: WannaCry signals worse things to come. Still, Ransomware, zero-day exploits, and… Continue reading GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019