
What is single sign-on? How SSO improves security and the user experience
Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.
Doug Drinkwater | 18 Jul | Read more
Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.
Doug Drinkwater | 18 Jul | Read more
Digital transformation is front of mind for many senior executives, but too often security is left behind.
Doug Drinkwater | 14 Mar | Read more
A virtual CISO (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in the role.
Doug Drinkwater | 09 Mar | Read more
Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.
Doug Drinkwater | 06 Feb | Read more
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
Doug Drinkwater | 22 Jan | Read more
DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.
Doug Drinkwater | 09 Jan | Read more
Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.
Doug Drinkwater | 12 Dec | Read more
In the arms race between white and black hats, the infosec industry looks to quantum encryption and quantum key distribution (QKD). That may be just part of the answer, however.
Doug Drinkwater | 08 Nov | Read more
Failure to comply with the EU General Data Protection Regulation (GDPR) leaves firms vulnerable to penalties, but many U.S. companies doing business in Europe are in danger of missing the deadline. Here’s how to catch up.
Doug Drinkwater | 09 Oct | Read more
The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.
Doug Drinkwater | 29 Aug | Read more
Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.
Doug Drinkwater | 27 Jun | Read more
Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.
Doug Drinkwater | 14 Jun | Read more
Chief Information Security Officers are a relatively rare breed. Information security is, after all, a relatively recent addition or subset to IT, and while most large organizations now do profess to having a CISO, CSO or head of information security, many still don’t. Indeed, it’s often the case that a company appoints its first CISO in the aftermath of a data breach - like Target did in 2014 or Sony in 2011.
Doug Drinkwater | 07 Mar | Read more
For as long as there has been security, there have been difficulties, and differences of opinion, between the CISO and CEO.
Doug Drinkwater | 24 Nov | Read more