Infosecurity Opinions

  1. The Four Steps to AppSec in the Age of Dynamic Language Processing

    With more and more companies moving to the cloud to run their businesses, the pressure on developers to push out web applications at a rapid pace is continuing to grow

    1. Photo of Mike Milner

      Mike Milner

      Co-Founder and CTO, IMMUNIO

  2. The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For

    Security teams need to take advantage of a significant source of intelligence already available in the company - the HR team

    1. Photo of David Green

      David Green

      chief security officer of Veriato

  3. A Guide to Cyber Threat Hunting Operations

    Tim Bandos, director of cybersecurity at Digital Guardian, discusses where businesses should start when conducting their own cyber threat hunts

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  4. Are We Reaching Peak Data?

    Many security teams cannot respond to what is in front of them, because there is simply too much

    1. Photo of Ed Macnair

      Ed Macnair

      CEO, CensorNet

  5. Tit-for-Tat: Cyber Retaliation

    In recent weeks, two examples highlight the dangerous precedent of the 'tit-for-tat' mentality in the cyber domain

    1. Photo of Ash J. Hunt

      Ash J. Hunt

      Contributing Writer

  6. Breach Detection or Breach Prevention?

    How can IT teams balance the need to prevent with the need to detect?

    1. Photo of Gur Shatz

      Gur Shatz

      Chief Technology Officer, Cato Networks

  7. As Industry 4.0 Marches on, the Manufacturing Sector Must be Better Prepared for Cyber-Attacks

    The idea of factories full of driverless forklifts and collaborating robot workers was once the stuff of pure science fiction, but has now become the common reality for smart factories around the world

    1. Photo of Mirko  Brandner

      Mirko Brandner

      Technical Manager, Arxan Technologies

  8. How to Avoid Drowning in your Security ‘Data Lakes’

    Security monitoring is a ubiquitous task throughout all enterprises that are attempting to not only thwart malicious activities but to understand and optimize authentic traffic to their information systems

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  9. How to Prepare for the EU GDPR

    A recent report revealed that only 4% of British companies understand the impact of the European Commission’s upcoming GDPR. For the remaining 96%, it is very much in their interest to find out

    1. Photo of Simon Kouttis

      Simon Kouttis

      Head of Cyber Security, Stott and May

  10. Effective App Security: the Importance of Collaboration throughout the Command Chain

    In today’s online business environment, application security has never been more important. However, effective app security doesn’t just happen overnight, it requires a concerted effort from all parts of the business command chain

    1. Photo of Ryan O’Leary

      Ryan O’Leary

      VP Threat Research Centre, WhiteHat Security, WhiteHat Security

  11. Are Unsecure Medical Devices Opening the Backdoor for Hackers?

    Medical/health institutions must prioritize the management of user access if they want to ensure they have the adequate security levels around these access points

    1. Photo of Stuart Facey

      Stuart Facey

      VP International, Bomgar Corporation

  12. Signatures Are Dead, Now What?

    With LANGSEC technology able to instantly and accurately identify any malicious behavior within an application, why risk securing your application solely with perimeter protections?

    1. Photo of Kunal  Anand

      Kunal Anand

      CTO & CISO at Imperva

  13. The CISO Insomniac: What’s Keeping Them Awake at Night?

    There has never been a tougher time to be a Chief Information Security Officer. Regulatory changes across the EU have led to the introduction of much more stringent controls on how businesses should manage the customer data they collect

    1. Photo of Dr Darren Brooks

      Dr Darren Brooks

      EMEA Delivery Lead for Security Services, Unisys

  14. Four Lessons to Learn From the SWIFT Hacks

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  15. Media Organizations Beware – DDos Attacks are Coming

    There are many reasons behind a DDoS attack but one thing we have continued to see is the rise of DDoS attacks on media publications

    1. Photo of Tom Bienkowski

      Tom Bienkowski

      Director of Product Marketing, Arbor Networks

  16. Hack Hillary Clinton’s Email? Just Say Nyet

    Donald Trump's recent comments on Russian hacking are unethical, negligent and dangerous

    1. Photo of Nathan Wenzler

      Nathan Wenzler

      Senior Director of Cybersecurity, Moss Adams

  17. The Future of Mobile Security

    Mobility has become the new normal for computing, but the enterprise is not fully embracing the capabilities of always-on, always-connected, devices as a result of inadequate security tools.

    1. Photo of Alan Goode

      Alan Goode

      Managing Director, Goode Intelligence

  18. Cyber Fraud: The Unpunished Crime

    A recent report from the Fraud Advisory Panel discovered that victims suffer an average loss of £101,000 to cyber-fraud; yet a staggering one in three cases are not passed on for further investigation.

    1. Photo of Peter Martin

      Peter Martin

      Managing Director at RelianceACSN

  19. How IT/OT Collaboration Holds the Key to Manufacturing Security

    The new cyber reality has made operational technology (OT) operators crucial to securing manufacturing networks—the most targeted sector of industrial cyber-attacks in 2015, according to the U.S. Department of Homeland Security.

    1. Photo of Yoni Shohet

      Yoni Shohet

      Co-founder and CEO of SCADAfence

  20. Building an Effective Incident Response Plan

    A thoroughly prepared organization will suffer much less fallout when a comprehensive incident response plan is adopted and in place

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

What’s hot on Infosecurity Magazine?