Expert analysis

Seven key cybersecurity trends for 2020 by world-leading professionals
The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increase, so do the opportunities for cybercriminals to …

Four ways to prevent data breaches
When it comes to breaches, there are no big fish, small fish, or hiding spots. Almost every type of organization – including yours – has critical personally …

How to secure customer data for SaaS success
Recently, some of the biggest names in SaaS have experienced customer support data breaches. With data playing an important role in the success of customer support, companies …

Python backdoor attacks and how to prevent them
Python backdoor attacks are increasingly common. Iran, for example, used a MechaFlounder Python backdoor attack against Turkey last year. Scripting attacks are nearly as …

Crowdsourced pentesting is not without its issues
Crowdsourced security isn’t new anymore, having existed in one form or another as a consumable enterprise service since 2013 with the launch of the main crowdsourced platforms …

Personal data protection today: We should demand more
The growing number of cybersecurity incidents reported each year – and the fact that many attacks remain unreported for security and PR reasons – can leave even …

2020 cybersecurity risks: Insecure security tools, supply chains, abandonware
Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, …

Overcoming crypto assessment challenges to improve quantum readiness
Large enterprises have a major problem when it comes to preparing for the advent of quantum computing: few, if any, have a working knowledge of all the locations where …

Security is leaving the data center and moving to the edge
The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete. A …

Playing the infinite game with threat intelligence and cyber fusion
“We can know only that we know nothing. And that is the highest degree of human wisdom.” ― Leo Tolstoy, War and Peace. True wisdom, as Leo Tolstoy remarked, lies in …

Why ransomware continues to knock on healthcare’s door, enter, and create havoc
My name is Adam, and I’ve worked in the healthcare industry for over 15 years. In my current line of work, I assist healthcare facilities across the U.S. with their overall …

Coronavirus: You don’t get a pass when it comes to cybersecurity
I was saddened to learn that two people who attended RSAC 2020 in San Francisco had subsequently tested positive for COVID-19. This virulent disease has impacted our lives …