Expert analysis

Navigating GDPR in the mobile enterprise
Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

The real cost of alarm fatigue
One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

What’s the use of a privacy policy?
In 2012 it was reported that “16% of Internet users claim to always read privacy policies of the sites and online services with which they share their private …

The security status quo falls short with born-in-the-cloud software
Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will …

When AI and security automation become foolish and dangerous
There is a looming fear across all industries that jobs are at risk to artificial intelligence (AI), which can perform those same jobs better and faster than humans. A recent …

SIEM challenges: Why your security team isn’t receiving valuable insights
Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective …

Integrating GDPR into your day to day IT practices
GDPR, four letters that when combined strike fear into the heart of any sysadmin. Luckily, there is quite some time before it comes into force, which means getting into the …

Living in an Assume Breach world
Some security professionals claim their networks are secure from hacking. They may say this to justify a recent large purchase of security equipment. But many times, they say …

What’s needed for the first NYS DFS cybersecurity transitional phase?
The first transitional phase of the New York State’s Department of Financial Services (NYS DFS) cybersecurity regulation is upon us. As of August 28th, 2017 covered entities …

Gaming the system for a better experience
I play a lot of video games and one of the things I’ve noticed is that when you first start playing, the game often keeps you from venturing into places where you’re likely to …

Three barriers to digital IDs on the blockchain
There has been a lot of hype around blockchain technology and the benefits it could potentially bring to a wide variety of verticals, including identity verification. While …

Motivation roulette: Is pseudo-ransomware a term?
It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to …