Infosecurity Opinions

  1. Three Pillars of Docker Security: Visibility, Identification & Tracking

    Without tools to manage the security of Docker deployments, organizations risk exposing their containers to attack.

    1. Photo of Randy Kilmon

      Randy Kilmon

      vice president of engineering at Black Duck Software

  2. Can Facial Recognition Boost Security and Compliance?

    Today facial recognition is a powerful tool used widely by federal agencies and the military, and also emerging as an important component of security solutions for businesses.

    1. Photo of Yossi Zekri

      Yossi Zekri

      President & CEO, Acuant

  3. Battling the Botnet Armies

    Botnet armies have got bigger, more active and more heavily armed than ever before. In the first quarter of 2016, attacks launched by bots reached a record high of 311 million – a 300% increase compared with the same period in 2015, and a 35% increase compared with the final quarter of 2015.

    1. Photo of Jeff Harris

      Jeff Harris

      VP, Solutions Marketing at Ixia

  4. The Importance of a Cyber Incident Response Plan and the Steps Needed to Avoid Disaster

    In the immediate aftermath of a breach, organizations should have an incident response plan which includes incident detection as well as incident response. Despite this, we found that a third of organizations do not have an incident response plan in place, and two-thirds of those that do have never tested their plan. It’s like having a plan for a fire drill but never actually executing it.

    1. Photo of Rashmi Knowles

      Rashmi Knowles

      EMEA Field CTO, RSAC

  5. Lack of Security Has Cyber-Criminals Turning to SMEs

    While some SMEs (approximately 23%) have caught on to the potential risk posed by cybercrime, too many are still relying on outdated technology that only provides perimeter security, completely ignoring file-based threats.

    1. Photo of Chris Dye

      Chris Dye

      VP Alliances, Glasswall Solutions

  6. Analytics: The Single Key to Simultaneous Security and Productivity

    Rather than adding more layers to authentication, the solution lies in contextual analytics.

    1. Photo of Dave  Schuette

      Dave Schuette

      EVP and President, Synchronoss Enterprise Business Unit

  7. Why Education Institutions Need a Security Re-Education

    Over the last year, there has been an industry spotlight on data breaches, many of which have become front page news. Kaspersky and Experian are just two that had significant media attention.

    1. Photo of Paul  McEvatt

      Paul McEvatt

      Senior Cyber Threat Intelligence Manager, UK & Ireland at Fujitsu

  8. Teachable Moments: Five Cybersecurity Lessons from Emailgate

    FBI Director James Comey delivered a statement this week announcing the FBI does not recommend criminal charges against Hillary Clinton for her use of a private email server during her time as Secretary of State. While the findings of the investigation will be debated extensively, there are five data security lessons contained in the statement that apply to all organizations.

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones

  9. IoT is Finally Here, We All Need to Rethink Our Approach to Security

    It has been a long time coming, the concept of millions of devices connected via the internet has been talked about for at least 15 years, but the challenge of getting the hardware costs down to the point of insignificance and working with unreliable and patchy connections has meant that it has taken until now for the idea take hold.

    1. Photo of Simon Wesseldine

      Simon Wesseldine

      CSO of Idappcom

  10. Cybersecurity isn’t Rocket Science!

    Thinking about your organization’s data security infrastructure in terms of medieval warfare will actually help you to consider all of the potential threats posed to it, and most importantly, give you the insight you need to create a robust security infrastructure

    1. Photo of Andy Powell

      Andy Powell

      VP of UK Cybersecurity at Capgemini

  11. The Rising Tide of Android Malware

    As the mobile market matures, thieves are discovering new ways to exploit this captive audience of mobile users.

    1. Photo of Patrick Sweeney

      Patrick Sweeney

      Vice President of Product Management and Marketing at Dell Security

  12. Man and Machine: A Match Made in Cybersecurity Heaven

    I’m not suggesting that security analysts should be replaced by automated systems, rather, they should complement one another.

  13. Software Defined Security: Going Beyond Traditional Measures

    By adopting the SDSec model, businesses can realize the benefits of programmability and automation, which will consequently enable them to respond to today’s security threats in a more dynamic, efficient and intelligent way.

    1. Photo of Alexander Seyf

      Alexander Seyf

      Partner, Sytel Reply

  14. Rebuilding Digital Trust in The Age of The Hack

    We now live in an “Allternet” world, where all people, products and places are hyper-connected and fundamental shifts in how we interact and trust each other are emerging.

    1. Photo of Richard Parris

      Richard Parris

      CEO of Intercede

  15. How Can Your Company Radically Curb Insider Threat?

    At Zalando, our internal bug bounty program underlines the need to hack, learn from mistakes, and in the process, develop the most secure products.

    1. Photo of Christian Matthies

      Christian Matthies

      Security Lead at Zalando

  16. Exploiting SS7 Vulnerabilities in Mobile Networks for Criminal Gain

    Signaling System Number Seven, or SS7, is a widely-used protocol that enables mobile operators’ subscribers to communicate with each other. At the heart of an operator’s network, SS7 contains highly important data such as a subscriber’s identity, status and location, providing the operator with the ability to manage communications and bill their subscribers for the services they use.

    1. Photo of Ilia  Abramov

      Ilia Abramov

      Head of Network Security, Xura

  17. The SS7 Security Threat is Real. How Can MNOs Respond?

    It was only a matter of time, but the shortcomings of SS7 have become an issue impossible to ignore.

    1. Photo of Etienne Bonanno

      Etienne Bonanno

      Research and Development Manager, HAUD

  18. Data Breaches – Just a Cost of Doing Business or Tip of the Spear for Threats to Business?

    Now that major data breaches have become so commonplace, there is a growing perception that they are inevitable costs of doing business and resulting costs need to be paid, with the fallout contained as quickly as possible—and move on.

    1. Photo of David  Thompson

      David Thompson

      Senior Director of Product Management, LightCyber

  19. Metadata as a Divining Rod for Security

    Most security tools are not equipped to handle the increases in traffic speed as well as attack frequency

    1. Photo of Johnnie Konstantas

      Johnnie Konstantas

      Sr. Director, Enterprise Cybersecurity Group, Microsoft

  20. SOC Up and Listen

    It’s often said that listening is a skill in itself, and yet we’ve yet to grasp the nuances of listening to network noise. From the chatter on social media, to the deep recesses of the subterranean dark web, there’s now a vast array of data that we need to tap into, monitor and interpret to get advance warning before threats are realized.

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

What’s hot on Infosecurity Magazine?