fbpx

Latest Security Opinions


How digital ethics drives e-Healthcare systems in the cloud

The ethical challenges, risks, and benefits of using cloud platforms in digital healthcare 


Ensuring the ‘C’ in GRC: How to Keep Cloud BI in Order

Information always needs to be properly captured, stored, preserved, and disclosed when required. This issue is exacerbated further in the case of cloud storage, where business records are located outside the company’s perimeter.


Could the shift to remote working bring more women into cyber security?

Cybersecurity has always been a heavily male-dominated industry, but the rise of remote working can be used to encourage more women into the profession, solving the skills gap in the process.


It’s time to think beyond cyber harm

Given its enormity and value,  we tend to frame data breaches, manipulations, or attacks in terms of financial loss. But one must look at cyber breach beyond this immediate prism and delve into second-order realms not necessarily contained within the internet itself.


Unpacked: NIST’s prototype for securing container apps in shared cloud environments

David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.


Immutable Instantaneous Insurance: the missing link in the Data Chain?

The future of work is safer once we implement the immutable instantaneous missing link in the data and application security chain.


Cyber security in 2021: A White-hat hacker’s view

2020 wrapped up with the largest cyberespionage campaign in history, highlighting deep flaws in how we manage supply chain security. So, after a year of high stakes and alarming new records, here’s what I predict 2021 will bring.


Three ways big businesses can protect their networks

The cloud, the increasing use of third parties, and remote work will all pose a challenge to business resilience and security. But with the right advice and investment, there’s no reason your sensitive assets shouldn’t be safer this year.


How to align cyber security to your digital transformation strategy

In order to make sure that you have a strong cyber security strategy that matches your digital transformation, follow these tips.


What basketball teaches us about enterprise cyber security management

At its core, zero trust focuses on providing least-privilege access to only those users who need it. Put it this way: don’t trust anyone and even when you do, only give them what they need right now. This security philosophy would make Jordan proud.


Should digital health passports be denied entry?

All signs suggest digital health passports are a matter of when, not if.


Prioritising critical infrastructure during a global pandemic

Companies across all critical infrastructure sectors – from power plants to healthcare to manufacturing – must assume that sophisticated attackers are already inside the network.