Infosecurity Opinions

  1. Out of Sight, Out of Mind?

    It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  2. Business Decisions: Is It Time to Outsource Your Network Security?

    If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.

    1. Photo of David Wray

      David Wray

      Founder of Sec-Tec Ltd

  3. Locking Passwords Away – For Good

    The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.

    1. Photo of Nick Lowe

      Nick Lowe

      CEO of Silicon:SAFE

  4. Single Sign-On: Taking a Global Approach

    Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.

    1. Photo of Thierry Bettini

      Thierry Bettini

      Director of International Strategy, ILEX

  5. Top Ten Big Data Security and Privacy Challenges

    To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges

    1. Photo of Nitin Yadav

      Nitin Yadav

      Marketing Analyst

  6. Why Security Professionals Should Care about NoSQL and Big Data

    The top five reasons you should care about NoSQL:

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  7. Changing the Rules of the Game

    Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  8. The Exponential Growth of DDoS Attacks

    What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.

    1. Adam King

      Security Consultant at PGI Cyber

  9. Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way

    When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.

    1. Photo of Richard Page

      Richard Page

      Marketing director EMEA, CEE and Russia for Ixia

  10. Defence in Breadth

    Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.

    1. Photo of Jason Dover

      Jason Dover

      Director of Product Line Management at KEMP Technologies

  11. How Do You Really Know if Your Software Security Measures Up?

    Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.

    1. Photo of Sammy Migues

      Sammy Migues

      Principal Scientist at Synopsys

  12. How Can You Fend Off a Nation?

    While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

  13. Liability Can Change Attitudes to Corporate Cybersecurity

    As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.

    1. Photo of John Smith

      John Smith

      Principal solution architect at Veracode,

  14. ‘Dark DDoS’ – a growing cyber security threat for 2016

    A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  15. Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else

    When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.

    1. Photo of Pat Clawson

      Pat Clawson

      CEO, Blancco Technology Group

  16. The Burst of the EMV Bubble

    Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.

    1. Photo of Seth Ruden

      Seth Ruden

      Senior Fraud Consultant, Americas, ACI Worldwide

  17. Passivity may risk Security and Reliability of your Active Directory

    Top tips on turning an Active Directory implementation into a dream scenario.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  18. Protecting Corporate Data without Compromising on Experience

    The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.

    1. Photo of Mike ,  Raggo

      Mike , Raggo

      Director of Security Research, MobileIron

  19. Changing the Security Team’s Focus from Malware to the Credentials that Enable It

    Once an attacker has access to a good set of credentials, its game, set and match.

    1. Photo of Nir Polak

      Nir Polak

      CEO and co-founder, Exabeam

  20. Victims or Villains: Intelligent Incident Response Can Save the Day

    Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

What’s hot on Infosecurity Magazine?