Infosecurity Opinions

  1. Access All Areas?

    Identity and Access Management: two common access errors and how to avoid them

    1. Photo of Lee Painter

      Lee Painter

      CEO of Hypersocket Software

  2. Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation

    Adding client reputation monitoring to a cloud security strategy not only helps stop malicious attacks at the source, but also provides the security intelligence needed for improved security decisions and risk evaluation.

    1. Photo of Daniel Shugrue

      Daniel Shugrue

      Director of Product Marketing, Akamai

  3. Securing your Personal Entry Points

    Perhaps it is time to treat each member of staff as an individual local area network (LAN).

    1. Photo of Steve Watts

      Steve Watts

      Co-founder, SecurEnvoy

  4. How to Address the Cybersecurity Resourcing Challenge

    Many businesses are ill-equipped to address disruption of networks, attacks on infrastructure, DDoS attacks and theft of personal data, leaving them vulnerable to hackers.

    1. Photo of Stuart Reed

      Stuart Reed

      UK Director, Orange Cyberdefense

  5. Threat Hunting: Root out the Bad Guys Before it’s Too Late

    With cybercrime high on the agenda for many, IT professionals have spent too much time and energy discussing the causes, methods and impact of data breaches

    1. Photo of Ben Johnson

      Ben Johnson

      Co-Founder & Chief Security Strategist at Carbon Black

  6. Best Practices for the SOC Team – Where to Automate, Where to Think

    Security Operations Centers (SOC) teams in organizations are finding it especially difficult to build teams with the right balance of skills and experience.

    1. Photo of Shai  Morag

      Shai Morag

      CEO and Co-founder of SECDO

  7. Finding Alternative Ways to Close the Security Gap

    How does IT keep pace with all the new trends coming into the workplace, whilst ensuring that security is not compromised.

    1. Photo of Matt Piercy

      Matt Piercy

      Vice President of EMEA, Zscaler

  8. The Surprising Security Benefits of Data on Demand

    Network speeds now routinely hit 100 Gigabits per second, or roughly 70 million times faster than the typical network connection.

    1. Photo of Daniel Joseph Barry

      Daniel Joseph Barry

      VP Positioning and Chief Evangelist at Napatech

  9. Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap

    Despite phenomenal growth, continued investment and a proliferation of new technologies, the cybersecurity industry is still fighting its biggest challenge yet – that of finding and retaining talented security professionals.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  10. Why Cyber Protection Needs to be at the Scene of the Crime

    The modus operandi of the new generation of cyber-attackers is best defined by two key facets.

    1. Photo of Tomer Weingarten

      Tomer Weingarten

      CEO of SentinelOne

  11. How Secure is Your Company?

    How secure is your company, really? Most security professionals can’t answer this fundamental question.

    1. Photo of Ernesto DiGiambattista

      Ernesto DiGiambattista

      CEO and Founder of Cybric

  12. Why MX Records Matter in the Fight Against BEC and Spear Phishing

    By implementing integrated MX-record monitoring, and proactively blocking inbound emails from these potential attack platforms, security is dramatically reducing the enterprises’ imminent risks from spear phish or BEC attacks.

    1. Photo of Dylan Sachs

      Dylan Sachs

      BrandProtect Services Director, Identity Theft and Anti Phishing

  13. Defending Against Malicious Domains

    Cyber-criminals are constantly waging a cat-and-mouse game with threat researchers. Across the world, cyber-criminals rapidly create malicious domains as a base for launching cyber-attacks against organisations’ Domain Name System (DNS) infrastructure.

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  14. What does SIEM stand for?

    While it is widely understood – and required by regulation – that the availability of accurate log data is a mandatory requirement for a working security incident management process, many organizations are still struggling to make sense out of it.

    1. Photo of Gezim  Zeneli

      Gezim Zeneli

      Account Manager for Information Security at PECB

    2. Photo of Friedhelm Düsterhöft

      Friedhelm Düsterhöft

      Senior IT Security Consultant and Managing Director of msdd.neT GmbH

  15. Defending Advanced Persistent Threats - Be Better Prepared to Face the Worst

    APT, with its sophisticated and mercurial way of achieving its focused objectives, represents a fundamental shift in the traditional cyber-attack models

    1. Photo of Jyothi  Babu Thummala

      Jyothi Babu Thummala

      Director of Security Solutions - Infrastructure & Security Business at Happiest Minds Technologies

  16. 2016: Time for Security to Take its Head out of the “Sand” (box)

    Containment is a fairly new concept, deviating from the widely known and popular “sandboxing” method.

    1. Photo of Israel Levy

      Israel Levy

      CEO of BUFFERZONE

  17. The Virtual Mobile Infrastructure Debate is Mired in Myth

    Regarding usability, VMI decriers assume that user experience must suffer. It must be too slow and sluggish, they say. It won’t feel native, they presume. It’s just too niche for most businesses, they claim.

    1. Photo of Israel Lifshitz

      Israel Lifshitz

      Founder and CEO of Nubo

  18. Why Educating Employees is Key to Preventing the Risk of Shadow IT

    Why aren’t staff practicing what they preach when it comes to data security?

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  19. National Infrastructure Attacks Mark Ominous Milestone for Cyber Security

    The world of cybercrime expands each day, leading to the current state of affairs in which even national infrastructure organizations are vulnerable to the growing sophistication of hackers.

    1. Photo of Lewis Henderson

      Lewis Henderson

      VP of Product at Glasswall Solutions

  20. Handling Sensitivity in the Biotech World

    A company responsible for financing of a firm has significant intelligence on the operations of an organization and how it intends to use the resources available.

    1. Photo of Aaron Warner

      Aaron Warner

      Founder of ProCircular InfoSec

What’s hot on Infosecurity Magazine?