Latest Security Opinions
The ethical challenges, risks, and benefits of using cloud platforms in digital healthcare
Information always needs to be properly captured, stored, preserved, and disclosed when required. This issue is exacerbated further in the case of cloud storage, where business records are located outside the company’s perimeter.
Cybersecurity has always been a heavily male-dominated industry, but the rise of remote working can be used to encourage more women into the profession, solving the skills gap in the process.
Given its enormity and value, we tend to frame data breaches, manipulations, or attacks in terms of financial loss. But one must look at cyber breach beyond this immediate prism and delve into second-order realms not necessarily contained within the internet itself.
David Bisson says Trusted Compute Pools are key to understanding NIST’s Prototype for addressing a key IaaS security challenge.
The future of work is safer once we implement the immutable instantaneous missing link in the data and application security chain.
2020 wrapped up with the largest cyberespionage campaign in history, highlighting deep flaws in how we manage supply chain security. So, after a year of high stakes and alarming new records, here’s what I predict 2021 will bring.
The cloud, the increasing use of third parties, and remote work will all pose a challenge to business resilience and security. But with the right advice and investment, there’s no reason your sensitive assets shouldn’t be safer this year.
In order to make sure that you have a strong cyber security strategy that matches your digital transformation, follow these tips.
At its core, zero trust focuses on providing least-privilege access to only those users who need it. Put it this way: don’t trust anyone and even when you do, only give them what they need right now. This security philosophy would make Jordan proud.
All signs suggest digital health passports are a matter of when, not if.
Companies across all critical infrastructure sectors – from power plants to healthcare to manufacturing – must assume that sophisticated attackers are already inside the network.