Infosecurity Opinions

  1. Why Cyber Protection Needs to be at the Scene of the Crime

    The modus operandi of the new generation of cyber-attackers is best defined by two key facets.

    1. Photo of Tomer Weingarten

      Tomer Weingarten

      CEO of SentinelOne

  2. How Secure is Your Company?

    How secure is your company, really? Most security professionals can’t answer this fundamental question.

    1. Photo of Ernesto DiGiambattista

      Ernesto DiGiambattista

      CEO and Founder of Cybric

  3. Why MX Records Matter in the Fight Against BEC and Spear Phishing

    By implementing integrated MX-record monitoring, and proactively blocking inbound emails from these potential attack platforms, security is dramatically reducing the enterprises’ imminent risks from spear phish or BEC attacks.

    1. Photo of Dylan Sachs

      Dylan Sachs

      BrandProtect Services Director, Identity Theft and Anti Phishing

  4. Defending Against Malicious Domains

    Cyber-criminals are constantly waging a cat-and-mouse game with threat researchers. Across the world, cyber-criminals rapidly create malicious domains as a base for launching cyber-attacks against organisations’ Domain Name System (DNS) infrastructure.

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  5. What does SIEM stand for?

    While it is widely understood – and required by regulation – that the availability of accurate log data is a mandatory requirement for a working security incident management process, many organizations are still struggling to make sense out of it.

    1. Photo of Gezim  Zeneli

      Gezim Zeneli

      Account Manager for Information Security at PECB

    2. Photo of Friedhelm Düsterhöft

      Friedhelm Düsterhöft

      Senior IT Security Consultant and Managing Director of msdd.neT GmbH

  6. Defending Advanced Persistent Threats - Be Better Prepared to Face the Worst

    APT, with its sophisticated and mercurial way of achieving its focused objectives, represents a fundamental shift in the traditional cyber-attack models

    1. Photo of Jyothi  Babu Thummala

      Jyothi Babu Thummala

      Director of Security Solutions - Infrastructure & Security Business at Happiest Minds Technologies

  7. 2016: Time for Security to Take its Head out of the “Sand” (box)

    Containment is a fairly new concept, deviating from the widely known and popular “sandboxing” method.

    1. Photo of Israel Levy

      Israel Levy

      CEO of BUFFERZONE

  8. The Virtual Mobile Infrastructure Debate is Mired in Myth

    Regarding usability, VMI decriers assume that user experience must suffer. It must be too slow and sluggish, they say. It won’t feel native, they presume. It’s just too niche for most businesses, they claim.

    1. Photo of Israel Lifshitz

      Israel Lifshitz

      Founder and CEO of Nubo

  9. Why Educating Employees is Key to Preventing the Risk of Shadow IT

    Why aren’t staff practicing what they preach when it comes to data security?

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  10. National Infrastructure Attacks Mark Ominous Milestone for Cyber Security

    The world of cybercrime expands each day, leading to the current state of affairs in which even national infrastructure organizations are vulnerable to the growing sophistication of hackers.

    1. Photo of Lewis Henderson

      Lewis Henderson

      VP of Product at Glasswall Solutions

  11. Handling Sensitivity in the Biotech World

    A company responsible for financing of a firm has significant intelligence on the operations of an organization and how it intends to use the resources available.

    1. Photo of Aaron Warner

      Aaron Warner

      Founder of ProCircular InfoSec

  12. Information Security Culture: It’s Time to Upgrade to 2.0

    With the rapidly changing threats we now face, businesses need new approaches to information security and professionals that can think strategically about big picture challenges while having the tactical acumen and agility to respond to threats.

    1. Photo of Ric Messier

      Ric Messier

      Assistant Professor, Champlain College

  13. A New Era of Cyber Threats: The Infrastructure Hack

    CNI is not immune to cyber-attacks - IoT, Big Data and cybercrime have increased the attack opportunity.

    1. Photo of Andrew Kelly

      Andrew Kelly

      Chief Information Security Officer, QinetiQ Cyber Consulting

  14. Joined up Justice - Exploring the Art of Possible through Digital Integration

    Across Europe, central and local government departments are challenged by the need to drive greater digital initiatives enabling digital integration across their own department and the departments with which they collaborate and coordinate.

    1. Photo of John Wright

      John Wright

      Head of Strategic Initiatives at Unisys.

  15. Four Qualities of a Successful Cybersecurity Start-up

    Four of the common traits and strategies that are particularly relevant in the world of cybersecurity

    1. Photo of Riz Noor

      Riz Noor

      Programme Director, Cyber London

  16. The Need for IT Support to Evolve From Reactive to Proactive

    For IT departments, the most visible indicators of success are making sure employee end-users can access critical applications and IT services whenever and wherever they need them and with sufficient performance to do their jobs.

    1. Photo of Poul Nielsen

      Poul Nielsen

      Director of Strategy, Nexthink

  17. Coping in a 'Code Yellow' World with Threat Intelligence

    While there’s no specific threat identified, your mindset should be “the world is a potentially unfriendly place, I have to be on the lookout for potential threats”.

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  18. Top Five Ways to Improve SOC Efficiencies and Bridge the Security Skills Gap

    Not only have enterprises bought more products, but they also have tried to hire more security analysts to deal with alerts.

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  19. Want to Know Your Customer? Try Authenticating Them

    It’s no longer a question of “build or buy?”, but rather a matter of utilizing available tools to develop solutions that adapt to the challenges of protecting your users.

    1. Photo of Marc Boroditsky

      Marc Boroditsky

      president and general manager of Authy, a Twilio service

  20. To Err Is Human; To Automate, Divine

    99% of firewall breaches will be caused by simple firewall misconfigurations, not flaws.

    1. Photo of Joe DiPietro

      Joe DiPietro

      Americas SE Director, AlgoSec

What’s hot on Infosecurity Magazine?