Latest Security Opinions
Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.
No one wants to suffer the consequences of a serious cyber-attack. But the challenge of identifying advanced phishing threats is increasing. Businesses must respond with urgency to avoid being fooled.
In this Q&A, we talk with Jason Soroko from SSL447, a managed cybersecurity services company recently acquired by Sectigo. Soroko explains the importance of Public Key Infrastructure to Digital Identity and its centrality to Zero Trust Architecture.
Teams tasked with leading the cybersecurity strategy in their organisation could learn a simple lesson from the grey squirrel and the red kite. The grey squirrel represents an error in strategy – creating the opportunity for an ill-informed decision that one cannot reverse once it’s made. Merely manage and mitigate. The Red Kite demonstrates that a well-informed strategic decision which provisions, enables and optimises the right individuals to thrive and flourish can succeed to staggering effect and impact.
Businesses that evaluate their security program under a security maturity model will be far better placed to react to the unexpected.
The ethical challenges, risks, and benefits of using cloud platforms in digital healthcare
Information always needs to be properly captured, stored, preserved, and disclosed when required. This issue is exacerbated further in the case of cloud storage, where business records are located outside the company’s perimeter.
Cybersecurity has always been a heavily male-dominated industry, but the rise of remote working can be used to encourage more women into the profession, solving the skills gap in the process.
Given its enormity and value, we tend to frame data breaches, manipulations, or attacks in terms of financial loss. But one must look at cyber breach beyond this immediate prism and delve into second-order realms not necessarily contained within the internet itself.
David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.
The future of work is safer once we implement the immutable instantaneous missing link in the data and application security chain.
2020 wrapped up with the largest cyberespionage campaign in history, highlighting deep flaws in how we manage supply chain security. So, after a year of high stakes and alarming new records, here’s what I predict 2021 will bring.