Expert analysis

We can’t rely on black swans: Three areas to improve cyber policy now
What will it take for cybersecurity policy to finally catch up to the digital age? I get this question often, and increasingly I worry that it will take a true “black swan” …

Where does corporate cloud security responsibility begin and service provider responsibility end?
Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

Has healthcare misdiagnosed the cybersecurity problem?
Take a cursory look at the U.S. Department of Health and Human Services’ (HHS) wall of data breach shame and you might be scratching your head: Why does the healthcare sector …

Identity-in-depth and the evolution of defense
We’ve seen it over and over again: the parade of companies and government agencies announcing the impact of their latest breach. These players have something in common that …

Intrusion detection is speeding up: Is it enough to tackle global cyber threats?
As criminals continue to develop new methods to break or sidestep cyber defences, in many cases the focus is shifting towards the ability to detect and respond to an incident …

Shark or not? 3 real-life security scenarios and how to tell which will really bite
We’ve just wrapped one of my favorite weeks of television, Shark Week. Viewers were treated to show after show of sharks stalking and attacking helpless victims. In most …

Container security: The seven biggest mistakes companies are making
As enterprises increase adoption of containers, they also risk increasing the number of mistakes they make with the technology. Given that many companies are still wrapping …

The future of AppSec: Stop fighting the last war
It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true …

Is cyber insurance worth the paper it’s written on?
Weighing up whether you think insurance is worth it, in any situation, depends to some extent on personal experience. You can see the value of protection far more clearly if …

Decrypting DEF CON badge challenges
Every summer, tens of thousands of hackers and information security enthusiasts make a journey to the Last Vegas strip for the Black Hat and DEF CON security conferences. …

Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …

Could e-discovery pros fill the insatiable demand for cybersecurity talent?
When looking at the cybersecurity industry from a jobs perspective, there is no denying demand for talent far exceeds supply. With many lingering vacant job requisitions, who …