Infosecurity Opinions

  1. Coping in a 'Code Yellow' World with Threat Intelligence

    While there’s no specific threat identified, your mindset should be “the world is a potentially unfriendly place, I have to be on the lookout for potential threats”.

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  2. Top Five Ways to Improve SOC Efficiencies and Bridge the Security Skills Gap

    Not only have enterprises bought more products, but they also have tried to hire more security analysts to deal with alerts.

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  3. Want to Know Your Customer? Try Authenticating Them

    It’s no longer a question of “build or buy?”, but rather a matter of utilizing available tools to develop solutions that adapt to the challenges of protecting your users.

    1. Photo of Marc Boroditsky

      Marc Boroditsky

      president and general manager of Authy, a Twilio service

  4. To Err Is Human; To Automate, Divine

    99% of firewall breaches will be caused by simple firewall misconfigurations, not flaws.

    1. Photo of Joe DiPietro

      Joe DiPietro

      Americas SE Director, AlgoSec

  5. Looking Past the ‘APT’ Hype to Defend Against Today’s (Actual) Advanced Threats

    Much of the work in threat protection is focused on helping employees recognize and avoid sophisticated phishing attacks.

    1. Photo of Thomas Fischer

      Thomas Fischer

      Principal Threat Researcher, Digital Guardian

  6. Life Sciences Information Security

    A Broad Overview of the Unique Challenges Serving Biotech, Pharma and Academia.

    1. Photo of Aaron Warner

      Aaron Warner

      Founder of ProCircular InfoSec

  7. Protecting the New Perimeter

    Ultimately, recognizing the new perimeter and managing identities with SSO and provisioning will provide businesses with a better way to secure and control the magnitude of users, devices and applications that span traditional company and network boundaries.

    1. Photo of Phil Turner

      Phil Turner

      VP EMEA, Okta

  8. Static Code Analysis Tools for Bulletproof Software Security

    Manual security reviews are useful, but humans are humans after all, and they just aren't capable of finding every security hole within a large or even midsize application.

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  9. Could a Weak Link in the Chain Hamper Retailer Implementation of PCI DSS Version 3.2?

    Application of the PCI DSS’s latest system is not a quick fix, but a means to an end.

    1. Photo of Andy Duck

      Andy Duck

      Business Development Manager at Barron McCann

  10. Overcoming Application Security Challenges

    The majority of strategic business processes are supported by software applications, so why does application security continue to receive less budget and attention than network security?

    1. Photo of Jim Ivers

      Jim Ivers

      Chief Marketing Officer, Cigital

  11. Is Compliance Bad for Security?

    Standards are a security bar for organizations to meet through compliance. Arguably their value is in the reassurance they provide stakeholders that a baseline of reasonable security measures is in place. But what if compliance is faked?

    1. Photo of Edward Hardy

      Edward Hardy

      Head of Consultancy, CNS Group

  12. A Moving Target: Why SMEs need Threat Intelligence

    Justifying security spend can be challenging as a SME: there are limited resources, you’re trying to defend against an unquantifiable range of threats, and there are plenty of other aspects of the business to invest in that can give tangible results.

    1. Photo of James Parry

      James Parry

      Technical Manager at Auriga

  13. Communications Security Beyond the Turret

    What was once a system based on a digital time-division multiplexing (TDM) architecture has turned into a high-tech Internet Protocol (IP) based work center

    1. Photo of Joe Malec

      Joe Malec

      Senior Security Analyst, Express Scripts

  14. Who is Responsible for Cybersecurity Within Your Organization?

    Don't underestimate the need for clear guidance on who should do what within an organization.

    1. Photo of Andrew Beckett

      Andrew Beckett

      Managing Director, EMEA, Kroll.

  15. Security from the Ground Up: The Need for Data Classification

    Governments, businesses large and small, and even private citizens worry over how to keep their digital assets out of the wrong hands.

  16. The Service Desk: The Unsung Hero of IT Security

    Estimates suggest that the gap between a data breach and discovery is somewhere in the region of 80 and 200+ days, depending on whose research you’re reading.

    1. Photo of Roberto Casetta

      Roberto Casetta

      International Senior Vice President & GM at Heat Software

  17. Considerations around NFV security

    DNS security needs to be built into the NFV architecture

    1. Photo of Dilip Pillaipakam

      Dilip Pillaipakam

      VP of service provider strategy and products at Infoblox

  18. Regular Check-ups: Pentesting-as-a-Service

    Penetration testing needs to be performed much more frequently than it is today by most organizations, and that requires a new type of service offering: ‘pentesting-as-a-service’.

    1. Nick Rafferty

      COO of SureCloud

  19. Machine Learning – Keeping Us One Step Ahead of Fraudsters

    While it is clear that machine learning has a lot to offer to financial institutions and merchants in an effort to detect and prevent fraud, the approach does have its limitations.

    1. Photo of Jackie Barwell

      Jackie Barwell

      Director of Fraud Product Management, ACI Worldwide

  20. Why Weakening Encryption Could be Throwing the Baby Out with the Bathwater

    Should communications providers be legally forced to break their own security when required, even if they must fundamentally change the way their encryption works in order to comply?

    1. Photo of Richard Anstey

      Richard Anstey

      CTO EMEA, Intralinks

What’s hot on Infosecurity Magazine?