Infosecurity Opinions

  1. Defence in Breadth

    Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.

    1. Photo of Jason Dover

      Jason Dover

      Director of Product Line Management at KEMP Technologies

  2. How Do You Really Know if Your Software Security Measures Up?

    Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.

    1. Photo of Sammy Migues

      Sammy Migues

      Principal Scientist at Synopsys

  3. How Can You Fend Off a Nation?

    While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

  4. Liability Can Change Attitudes to Corporate Cybersecurity

    As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.

    1. Photo of John Smith

      John Smith

      Principal solution architect at Veracode,

  5. ‘Dark DDoS’ – a growing cyber security threat for 2016

    A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  6. Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else

    When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.

    1. Photo of Pat Clawson

      Pat Clawson

      CEO, Blancco Technology Group

  7. The Burst of the EMV Bubble

    Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.

    1. Photo of Seth Ruden

      Seth Ruden

      Senior Fraud Consultant, Americas, ACI Worldwide

  8. Passivity may risk Security and Reliability of your Active Directory

    Top tips on turning an Active Directory implementation into a dream scenario.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  9. Protecting Corporate Data without Compromising on Experience

    The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.

    1. Photo of Mike ,  Raggo

      Mike , Raggo

      Director of Security Research, MobileIron

  10. Changing the Security Team’s Focus from Malware to the Credentials that Enable It

    Once an attacker has access to a good set of credentials, its game, set and match.

    1. Photo of Nir Polak

      Nir Polak

      CEO and co-founder, Exabeam

  11. Victims or Villains: Intelligent Incident Response Can Save the Day

    Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  12. Longest Serving Member of the Team? Your Work Email Account

    When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  13. 2016 – The Year of the Cyber Exploit

    After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  14. The Cybersecurity Domino Effect

    The interlinked economy could be the biggest problem in security, and provide the weakest link.

    1. Ray Rothrock

      Chairman & CEO, RedSeal

  15. Shedding Light on the Dark Web

    The Government is to set up a task force to police the dark web.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  16. Is the Cyber Security Skills Gap Putting You in Danger?

    Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.

    1. Photo of Trevor Halstead

      Trevor Halstead

      ‎Product Specialist - Talent Services at Cybrary

  17. At Heart, We Are All Hacktivists

    Do ethics exist online, and whose determination is it on what is good and bad?

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  18. How should businesses deal with social media risks?

    There is a simple solution to the risks of social media, however; it might not be possible for many businesses.

    1. Photo of Ian Trump

      Ian Trump

      Security Lead for LogicNow

  19. The Need for Data Centric Security

    Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?

    1. Photo of Yoran Sirkis

      Yoran Sirkis

      CEO of Covertix

  20. Uncovering Covert Attack Communications Inside Your Network

    Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

    1. Photo of Hitesh Sheth

      Hitesh Sheth

      CEO of Vectra Networks

What’s hot on Infosecurity Magazine?