Infosecurity Opinions

  1. A Love Letter to my Network

    Network we have been through so much together and we look together to an exciting future.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  2. How to "Nudge" Your Business Back to Better Mobile Security

    Some businesses might think they're too small for a hacker to notice, but that’s a myth

    1. Photo of Tony Anscombe

      Tony Anscombe

      Senior Security Evangelist at AVG, AVG

  3. Meeting the Security Needs of SMEs in the Cloud

    Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.

    1. Photo of Oscar Marquez

      Oscar Marquez

      CTO of iSheriff

  4. There’s a RAT in Your Mobile

    At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  5. IP Cameras – The All-Seeing IoT Security Challenge

    The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.

    1. Photo of Matt Walmsley

      Matt Walmsley

      EMEA Director at Vectra Networks

  6. Out of Sight, Out of Mind?

    It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  7. Business Decisions: Is It Time to Outsource Your Network Security?

    If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.

    1. Photo of David Wray

      David Wray

      Founder of Sec-Tec Ltd

  8. Locking Passwords Away – For Good

    The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.

    1. Photo of Nick Lowe

      Nick Lowe

      CEO of Silicon:SAFE

  9. Single Sign-On: Taking a Global Approach

    Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.

    1. Photo of Thierry Bettini

      Thierry Bettini

      Director of International Strategy, ILEX

  10. Top Ten Big Data Security and Privacy Challenges

    To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges

    1. Photo of Nitin Yadav

      Nitin Yadav

      Marketing Analyst

  11. Why Security Professionals Should Care about NoSQL and Big Data

    The top five reasons you should care about NoSQL:

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  12. Changing the Rules of the Game

    Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  13. The Exponential Growth of DDoS Attacks

    What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.

    1. Adam King

      Security Consultant at PGI Cyber

  14. Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way

    When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.

    1. Photo of Richard Page

      Richard Page

      Marketing director EMEA, CEE and Russia for Ixia

  15. Defence in Breadth

    Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.

    1. Photo of Jason Dover

      Jason Dover

      Director of Product Line Management at KEMP Technologies

  16. How Do You Really Know if Your Software Security Measures Up?

    Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.

    1. Photo of Sammy Migues

      Sammy Migues

      Principal Scientist at Synopsys

  17. How Can You Fend Off a Nation?

    While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

  18. Liability Can Change Attitudes to Corporate Cybersecurity

    As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.

    1. Photo of John Smith

      John Smith

      Principal solution architect at Veracode,

  19. ‘Dark DDoS’ – a growing cyber security threat for 2016

    A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  20. Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else

    When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.

    1. Photo of Pat Clawson

      Pat Clawson

      CEO, Blancco Technology Group

What’s hot on Infosecurity Magazine?