- Cloud Security Risks and Benefits of Docker Application Containers
Docker containers share the host kernel, providing weaker isolation than virtual machines but offering security benefits like smaller vulnerability surfaces and easier patching through image...
- Leadership Know Your Firm's Economic Moat to Keep Security Relevant
Effective security decisions require understanding your company's economic moat—the competitive advantages that protect it from rivals. Framing risks in terms of threats to these moats (brand equity,...
- Encryption How the Digital Certificates Ecosystem is Being Strengthened
Several initiatives are strengthening the digital certificate ecosystem: improved certificate revocation checking, EFF's SSL Observatory for cataloging certificates, Google's Certificate Transparency...
- Social Networking 5 Tech Trends That Explain the Evolution of Online Threats
Five technology trends—mainstream Internet adoption, mobile device proliferation, social networking, connectivity between physical and virtual worlds, and cloud computing—have shaped how criminals...
- Risk Management Mutually-Assured Destruction as a Factor in Cyber Warfare
Since no practical defense exists against nation-state cyber intrusions, countries may need to compromise adversaries' IT assets to establish mutually-assured destruction as a deterrent. Nations with...
- Product Management What Does a Security Product Manager Do?
A security product manager defines product capabilities and drives adoption for information security solutions, working closely with customers, sales, and engineering teams. Unlike most infosec roles...