Infosecurity Opinions

  1. The Burst of the EMV Bubble

    Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.

    1. Photo of Seth Ruden

      Seth Ruden

      Senior Fraud Consultant, Americas, ACI Worldwide

  2. Passivity may risk Security and Reliability of your Active Directory

    Top tips on turning an Active Directory implementation into a dream scenario.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  3. Protecting Corporate Data without Compromising on Experience

    The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.

    1. Photo of Mike ,  Raggo

      Mike , Raggo

      Director of Security Research, MobileIron

  4. Changing the Security Team’s Focus from Malware to the Credentials that Enable It

    Once an attacker has access to a good set of credentials, its game, set and match.

    1. Photo of Nir Polak

      Nir Polak

      CEO and co-founder, Exabeam

  5. Victims or Villains: Intelligent Incident Response Can Save the Day

    Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  6. Longest Serving Member of the Team? Your Work Email Account

    When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  7. 2016 – The Year of the Cyber Exploit

    After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  8. The Cybersecurity Domino Effect

    The interlinked economy could be the biggest problem in security, and provide the weakest link.

    1. Ray Rothrock

      Chairman & CEO, RedSeal

  9. Shedding Light on the Dark Web

    The Government is to set up a task force to police the dark web.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  10. Is the Cyber Security Skills Gap Putting You in Danger?

    Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.

    1. Photo of Trevor Halstead

      Trevor Halstead

      ‎Product Specialist - Talent Services at Cybrary

  11. At Heart, We Are All Hacktivists

    Do ethics exist online, and whose determination is it on what is good and bad?

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  12. How should businesses deal with social media risks?

    There is a simple solution to the risks of social media, however; it might not be possible for many businesses.

    1. Photo of Ian Trump

      Ian Trump

      Security Lead for LogicNow

  13. The Need for Data Centric Security

    Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?

    1. Photo of Yoran Sirkis

      Yoran Sirkis

      CEO of Covertix

  14. Uncovering Covert Attack Communications Inside Your Network

    Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

    1. Photo of Hitesh Sheth

      Hitesh Sheth

      CEO of Vectra Networks

  15. For Enterprise Cybersecurity, Think Modern Metropolis, not Fortress

    Cybersecurity is less a fortress, and more of a metropolis—with porous and amorphous boundaries.

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  16. Bootstrap Businesses Should Follow These Principals to Survive

    When building a business, focus on transparency, flexibility, efficiency, responsibility and passion.

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  17. The Danger with Data in a Changing European Landscape

    Following the significant announcement of the GDPR, this has highlighted the importance of companies getting a handle on their data.

    1. Photo of Richard Munro

      Richard Munro

      Chief Technologist and Technical Director for vCloud Air EMEA, VMware, VMware

  18. Tackling The Impact Of Fraud By Utilising Machine Learning Tactics

    Fraudulent activity such as ‘account takeover’ and ‘application fraud target vulnerable people and fraud systems that rely on rules can’t keep up with changing attacks.

    1. Photo of Luke  Reynolds

      Luke Reynolds

      Director of Fraud, Featurespace

  19. How To Spot And Block Bad Bots

    Some website owners won’t do anything about bots, ultimately granting the bad bots unfettered access right alongside the good bots.

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  20. Hack Me: A Geopolitical Analysis of the Government Use of Surveillance Software

    Hacking Team-style methodologies represent a new era of cyber-espionage—and they’re on sale for any government willing to pay. This is where ethical ambiguity comes in.

    1. Photo of Adam McNeil

      Adam McNeil

      Malware Intelligence Analyst, Malwarebytes Labs

What’s hot on Infosecurity Magazine?