Infosecurity Opinions

  1. Fighting Back Against DDoS

    DDoS attacks will continue as targeted organizations pay the ransom fees

    1. Photo of John Bambenek

      John Bambenek

      Manager of Threat Systems, Fidelis Cybersecurity

  2. File Sharing: The Silent Threat

    Employees secretly transfer various forms of confidential information to cloud-based file-sharing services.

    1. Photo of John Moynihan

      John Moynihan

      Founder of Minuteman Governance

  3. Banking's Darkside Lurks in Your Inbox

    While banks cannot and will not be able to stop all attacks, staying up to date on current threats and investing heavily in security teams and technology will most certainly help them prevent most.

    1. Photo of Itay Glick

      Itay Glick

      Co-founder and CEO of Votiro

  4. Bridging the Gap Between Executive Cyber Awareness and Enterprise Security

    IT security professionals are facing greater challenges than ever before and should be providing greater visibility into how cybersecurity programmes are performing.

    1. Photo of Matt  Middleton-Leal

      Matt Middleton-Leal

      UK and Ireland Director, CyberArk

  5. Defending Against the APT Paradigm

    With an APT, it is very difficult to profile an attack and get an idea on which technologies would have helped or mitigated the attacks.

    1. Photo of Dennis Griffin

      Dennis Griffin

      Product Manager, Vidder

  6. Government Security and Data Breaches: Problems and Solutions

    OPM made painfully clear the need for government (and other) organizations to adopt security policies.

    1. Photo of Asaf Cidon

      Asaf Cidon

      VP Email Security, Barracuda

  7. A Love Letter to my Network

    Network we have been through so much together and we look together to an exciting future.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  8. How to "Nudge" Your Business Back to Better Mobile Security

    Some businesses might think they're too small for a hacker to notice, but that’s a myth

    1. Photo of Tony Anscombe

      Tony Anscombe

      Senior Security Evangelist at AVG, AVG

  9. Meeting the Security Needs of SMEs in the Cloud

    Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.

    1. Photo of Oscar Marquez

      Oscar Marquez

      CTO of iSheriff

  10. There’s a RAT in Your Mobile

    At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  11. IP Cameras – The All-Seeing IoT Security Challenge

    The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.

    1. Photo of Matt Walmsley

      Matt Walmsley

      EMEA Director at Vectra Networks

  12. Out of Sight, Out of Mind?

    It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  13. Business Decisions: Is It Time to Outsource Your Network Security?

    If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.

    1. Photo of David Wray

      David Wray

      Founder of Sec-Tec Ltd

  14. Locking Passwords Away – For Good

    The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.

    1. Photo of Nick Lowe

      Nick Lowe

      CEO of Silicon:SAFE

  15. Single Sign-On: Taking a Global Approach

    Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.

    1. Photo of Thierry Bettini

      Thierry Bettini

      Director of International Strategy, ILEX

  16. Top Ten Big Data Security and Privacy Challenges

    To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges

    1. Photo of Nitin Yadav

      Nitin Yadav

      Marketing Analyst

  17. Why Security Professionals Should Care about NoSQL and Big Data

    The top five reasons you should care about NoSQL:

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  18. Changing the Rules of the Game

    Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  19. The Exponential Growth of DDoS Attacks

    What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.

    1. Adam King

      Security Consultant at PGI Cyber

  20. Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way

    When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.

    1. Photo of Richard Page

      Richard Page

      Marketing director EMEA, CEE and Russia for Ixia

What’s hot on Infosecurity Magazine?