Latest Security Opinions

How to Select the Right Cybersecurity Career Path

Those doing these early cybersecurity jobs ended up knowing a bit about everything and evolved into generalists. Since then, with so many new avenues of technology, most of these generalists either specialised or went into management. New recruits don’t have time to acquire the historical knowledge of generalists

False positives are only one part of a bigger cybersecurity problem

False positives are a symptom of a problem, not the cause Security ‘alert fatigue’ is a real issue. According to a recent report from the SANS Institute, alert fatigue is one of the biggest barriers to retaining top security talent. Many of the most common security tools, including security incident and event management (SIEM) tools… Read More

The Three Pillars Of A Resilient Ransomware Strategy

Building a resilient defense against ransomware is becoming a ‘must-have’ for any organisation that takes the risks seriously and wants to protect its IT ecosystem from the downtime, disruption, and cost that frequently come with ransomware infections.

What will be your organisation’s “go or no go” moment?

However powerful your leadership, however large your organisation, however advanced your systems and however well trained your personnel, the success or failure of your critical systems can be decided in one small “go or no go” moment

DevSecOps: Eight tips for truly securing software

Essential guidance for keeping software truly secure A lot has been said about DevSecOps from experts, practitioners, pundits and vendors. However, recommendations that start and finish with securing code leave critical gaps. In order to keep software secure, businesses must go beyond just securing the code they are developing to also secure the pipeline that delivers that… Read More

Why diversity should be at the forefront of identity

Collectively we have a responsibility to ensure digital identity technologies are truly inclusive and don’t exclude or misrepresent the underrepresented, writes Cindy White, CMO, Mitek.

Looking out for cybercriminals’ latest tricks this April Fool’s Day

No one wants to suffer the consequences of a serious cyber-attack. But the challenge of identifying advanced phishing threats is increasing. Businesses must respond with urgency to avoid being fooled.

CTO Interview – Sectigo’s Jason Soroko on the Future of Digital Identity

In this Q&A, we talk with Jason Soroko from SSL447, a managed cybersecurity services company recently acquired by Sectigo. Soroko explains the importance of Public Key Infrastructure to Digital Identity and its centrality to Zero Trust Architecture. 

What can squirrels teach us about cybersecurity?

Teams tasked with leading the cybersecurity strategy in their organisation could learn a simple lesson from the grey squirrel and the red kite. The grey squirrel represents an error in strategy – creating the opportunity for an ill-informed decision that one cannot reverse once it’s made. Merely manage and mitigate.  The Red Kite demonstrates that a well-informed strategic decision which provisions, enables and optimises the right individuals to thrive and flourish can succeed to staggering effect and impact.

How to bolster cybersecurity defences with security maturity modelling

Businesses that evaluate their security program under a security maturity model will be far better placed to react to the unexpected.

How digital ethics drives e-Healthcare systems in the cloud

The ethical challenges, risks, and benefits of using cloud platforms in digital healthcare 

Ensuring the ‘C’ in GRC: How to Keep Cloud BI in Order

Information always needs to be properly captured, stored, preserved, and disclosed when required. This issue is exacerbated further in the case of cloud storage, where business records are located outside the company’s perimeter.