Latest Security Opinions

Why diversity should be at the forefront of identity

Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.

Looking out for cybercriminals’ latest tricks this April Fool’s Day

No one wants to suffer the consequences of a serious cyber-attack. But the challenge of identifying advanced phishing threats is increasing. Businesses must respond with urgency to avoid being fooled.

CTO Interview – Sectigo’s Jason Soroko on the Future of Digital Identity

In this Q&A, we talk with Jason Soroko from SSL447, a managed cybersecurity services company recently acquired by Sectigo. Soroko explains the importance of Public Key Infrastructure to Digital Identity and its centrality to Zero Trust Architecture. 

What can squirrels teach us about cybersecurity?

Teams tasked with leading the cybersecurity strategy in their organisation could learn a simple lesson from the grey squirrel and the red kite. The grey squirrel represents an error in strategy – creating the opportunity for an ill-informed decision that one cannot reverse once it’s made. Merely manage and mitigate.  The Red Kite demonstrates that a well-informed strategic decision which provisions, enables and optimises the right individuals to thrive and flourish can succeed to staggering effect and impact.

How to bolster cybersecurity defences with security maturity modelling

Businesses that evaluate their security program under a security maturity model will be far better placed to react to the unexpected.

How digital ethics drives e-Healthcare systems in the cloud

The ethical challenges, risks, and benefits of using cloud platforms in digital healthcare 

Ensuring the ‘C’ in GRC: How to Keep Cloud BI in Order

Information always needs to be properly captured, stored, preserved, and disclosed when required. This issue is exacerbated further in the case of cloud storage, where business records are located outside the company’s perimeter.

Could the shift to remote working bring more women into cyber security?

Cybersecurity has always been a heavily male-dominated industry, but the rise of remote working can be used to encourage more women into the profession, solving the skills gap in the process.

It’s time to think beyond cyber harm

Given its enormity and value,  we tend to frame data breaches, manipulations, or attacks in terms of financial loss. But one must look at cyber breach beyond this immediate prism and delve into second-order realms not necessarily contained within the internet itself.

Unpacked: NIST’s prototype for securing container apps in shared cloud environments

David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.

Immutable Instantaneous Insurance: the missing link in the Data Chain?

The future of work is safer once we implement the immutable instantaneous missing link in the data and application security chain.

Cyber security in 2021: A White-hat hacker’s view

2020 wrapped up with the largest cyberespionage campaign in history, highlighting deep flaws in how we manage supply chain security. So, after a year of high stakes and alarming new records, here’s what I predict 2021 will bring.