Infosecurity Opinions

  1. The CISO Insomniac: What’s Keeping Them Awake at Night?

    There has never been a tougher time to be a Chief Information Security Officer. Regulatory changes across the EU have led to the introduction of much more stringent controls on how businesses should manage the customer data they collect

    1. Photo of Dr Darren Brooks

      Dr Darren Brooks

      EMEA Delivery Lead for Security Services, Unisys

  2. Four Lessons to Learn From the SWIFT Hacks

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  3. Media Organizations Beware – DDos Attacks are Coming

    There are many reasons behind a DDoS attack but one thing we have continued to see is the rise of DDoS attacks on media publications

    1. Photo of Tom Bienkowski

      Tom Bienkowski

      Director of Product Marketing, Arbor Networks

  4. Hack Hillary Clinton’s Email? Just Say Nyet

    Donald Trump's recent comments on Russian hacking are unethical, negligent and dangerous

    1. Photo of Nathan Wenzler

      Nathan Wenzler

      Senior Director of Cybersecurity, Moss Adams

  5. The Future of Mobile Security

    Mobility has become the new normal for computing, but the enterprise is not fully embracing the capabilities of always-on, always-connected, devices as a result of inadequate security tools.

    1. Photo of Alan Goode

      Alan Goode

      Managing Director, Goode Intelligence

  6. Cyber Fraud: The Unpunished Crime

    A recent report from the Fraud Advisory Panel discovered that victims suffer an average loss of £101,000 to cyber-fraud; yet a staggering one in three cases are not passed on for further investigation.

    1. Photo of Peter Martin

      Peter Martin

      Managing Director at RelianceACSN

  7. How IT/OT Collaboration Holds the Key to Manufacturing Security

    The new cyber reality has made operational technology (OT) operators crucial to securing manufacturing networks—the most targeted sector of industrial cyber-attacks in 2015, according to the U.S. Department of Homeland Security.

    1. Photo of Yoni Shohet

      Yoni Shohet

      Co-founder and CEO of SCADAfence

  8. Building an Effective Incident Response Plan

    A thoroughly prepared organization will suffer much less fallout when a comprehensive incident response plan is adopted and in place

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  9. Five Lessons for Good Airport Security Practices

    Unfortunately for the people that run Tampa International Airport, they experienced an IT security breach as reported in May. However, unlike a lot of the other organizations, because it is an international airport, the profile of the breach was far higher because of its security status.

    1. Photo of Will Cuthbert

      Will Cuthbert

      Director of Solutions Engineering at Bomgar

  10. Security for IoT devices

    The whole IoT system should be architected in a way that protects information and assets at all levels.

    1. Photo of Mike Eftimakis

      Mike Eftimakis

      IoT Product Manager – ARM Ltd

  11. The Growth of Runtime Application Self Protection

    RASP based technologies promise to eliminate false positives, reduce the complexity of securing applications and to lock down the most common vulnerabilities being exploited today.

  12. 24x7 SOCs: The Answer to all Monitoring and Logging Needs?

    Monitoring and logging are crucial aspects of cyber assurance strategies that have been around for many years, however, the reality that cyber-attacks and breaches now happen to anyone and everyone is inevitably bringing the need for round the clock ‘situational awareness’ to the fore.

    1. Photo of Noreen Beg

      Noreen Beg

      compliance service delivery lead at Nettitude

  13. Too Many Incident Responders are Chasing Fires that do not Exist

    There’s a fundamental problem with security tools in the market today: they detect and judge events in isolation.

    1. Photo of Ryan Stolte

      Ryan Stolte

      co-founder and CTO at Bay Dynamics

  14. Yesterday’s News: Security is a Board level issue

    The fact that cybersecurity is a board issue is yesterday’s news. You’d be hard pressed today to find a CISO who isn’t spending more time preparing reports for their executive and audit committees. Today’s dilemma is what information to share in order to help inform business decisions.

    1. Photo of Nik Whitfield

      Nik Whitfield

      chairman and founder, Panaseer

  15. Three Pillars of Docker Security: Visibility, Identification & Tracking

    Without tools to manage the security of Docker deployments, organizations risk exposing their containers to attack.

    1. Photo of Randy Kilmon

      Randy Kilmon

      vice president of engineering at Black Duck Software

  16. Can Facial Recognition Boost Security and Compliance?

    Today facial recognition is a powerful tool used widely by federal agencies and the military, and also emerging as an important component of security solutions for businesses.

    1. Photo of Yossi Zekri

      Yossi Zekri

      President & CEO, Acuant

  17. Battling the Botnet Armies

    Botnet armies have got bigger, more active and more heavily armed than ever before. In the first quarter of 2016, attacks launched by bots reached a record high of 311 million – a 300% increase compared with the same period in 2015, and a 35% increase compared with the final quarter of 2015.

    1. Photo of Jeff Harris

      Jeff Harris

      VP, Solutions Marketing at Ixia

  18. The Importance of a Cyber Incident Response Plan and the Steps Needed to Avoid Disaster

    In the immediate aftermath of a breach, organizations should have an incident response plan which includes incident detection as well as incident response. Despite this, we found that a third of organizations do not have an incident response plan in place, and two-thirds of those that do have never tested their plan. It’s like having a plan for a fire drill but never actually executing it.

    1. Photo of Rashmi Knowles

      Rashmi Knowles

      EMEA Field CTO, RSAC

  19. Lack of Security Has Cyber-Criminals Turning to SMEs

    While some SMEs (approximately 23%) have caught on to the potential risk posed by cybercrime, too many are still relying on outdated technology that only provides perimeter security, completely ignoring file-based threats.

    1. Photo of Chris Dye

      Chris Dye

      VP Alliances, Glasswall Solutions

  20. Analytics: The Single Key to Simultaneous Security and Productivity

    Rather than adding more layers to authentication, the solution lies in contextual analytics.

    1. Photo of Dave  Schuette

      Dave Schuette

      EVP and President, Synchronoss Enterprise Business Unit

What’s hot on Infosecurity Magazine?