Expert Articles

Back to homepage

Application Security: Only As Good As the Company You Keep

By John Adams, Chief Executive Officer at Waratek, According to Microsoft chief executive Satya Nadella, in the near future “every business will become a software business.” By leveraging the right

CISOs Are Burning Out: Here’s How to Fix It

By Ewen O’Brien – VP of Enterprise, EMEA at BitSight, Everyone experiences stress in their jobs, but security leaders may have it worse than most. According to recent research, 60%

SOAR vs. Security Operations: What’s Really Going On?

By John Czupak – CEO at ThreatQuotient, There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of

5 Ways How Big Data Helps to Fight Cybersecurity Threat

By Christopher Roberts – Business Development Manager at Data Entry Outsourced, In the online world where information has become a currency, modern businesses and organizations are required to go through

2019 WordPress Web Hosting Best Practices to Ensure Security

By Andrew Thompson – Bigdropnic.com, While thinking of website hosting, anyone may be concerned about security with the news about some major data breaches even with some of the top

MITRE ATT&CK framework: keep your friends close, but your enemies even closer

By Steve Rivers -Technical Director International at ThreatQuotient, For decades, security professionals have been stuck in a pattern of adding the latest technology or another threat feed to improve their

Edge Computing and Virtual Desktop Infrastructure (VDI): A Perfect Pairing

By Alan Conboy – Office of the CTO at Scale Computing, Virtual desktop infrastructure (VDI), a virtualization technology that creates fully personalized, individual desktop virtual machines with user profile control

How to establish insider threat programmes and conduct investigations

By Josh Lefkowitz – CEO at FlashPoint, Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are

Governance, Risk and Compliance – Enacting Proactive Risk Management

By Tom Kellermann, Chief Cybersecurity Officer for Carbon Black, In the highly regulated industries of finance, healthcare and energy, a focus on governance, risk and compliance (GRC) is crucial to

Cloud Security For Businesses

By Katherine Palac – Director of Marketing at Column Information Security, Taking advantage of new technology means being cautious about it. Although the impulse for many businesses is to jump