Infosecurity Opinions

  1. Changing the Rules of the Game

    Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  2. The Exponential Growth of DDoS Attacks

    What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.

    1. Adam King

      Security Consultant at PGI Cyber

  3. Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way

    When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.

    1. Photo of Richard Page

      Richard Page

      Marketing director EMEA, CEE and Russia for Ixia

  4. Defence in Breadth

    Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.

    1. Photo of Jason Dover

      Jason Dover

      Director of Product Line Management at KEMP Technologies

  5. How Do You Really Know if Your Software Security Measures Up?

    Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.

    1. Photo of Sammy Migues

      Sammy Migues

      Principal Scientist at Synopsys

  6. How Can You Fend Off a Nation?

    While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

  7. Liability Can Change Attitudes to Corporate Cybersecurity

    As Britain marks 50 years since the first seatbelt law was introduced this month, we celebrate how driver liability changed norms and saved thousands of lives.

    1. Photo of John Smith

      John Smith

      Principal solution architect at Veracode,

  8. ‘Dark DDoS’ – a growing cyber security threat for 2016

    A ‘Dark DDoS’ acts as a smokescreen to distract IT teams from the real breach that’s taking place.

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  9. Let’s Get Physical: Securing Data in Connected Homes, Cars & Everywhere Else

    When you look at connected household products like smart refrigerators and thermostats, they have a much longer lifecycle than the average period of time a person stays in one residence. That’s why protecting the enormous amounts of data transmitted through digital devices to these gadgets is vital.

    1. Photo of Pat Clawson

      Pat Clawson

      CEO, Blancco Technology Group

  10. The Burst of the EMV Bubble

    Despite stronger measures coming in, there are still breaches, skimming and fraud, and in fact, they are just as bad as they have ever been.

    1. Photo of Seth Ruden

      Seth Ruden

      Senior Fraud Consultant, Americas, ACI Worldwide

  11. Passivity may risk Security and Reliability of your Active Directory

    Top tips on turning an Active Directory implementation into a dream scenario.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  12. Protecting Corporate Data without Compromising on Experience

    The biggest challenge in this new age of data flow is to ensure corporate data remains secure, without restricting access to the hardware and software that employees want to use.

    1. Photo of Mike ,  Raggo

      Mike , Raggo

      Director of Security Research, MobileIron

  13. Changing the Security Team’s Focus from Malware to the Credentials that Enable It

    Once an attacker has access to a good set of credentials, its game, set and match.

    1. Photo of Nir Polak

      Nir Polak

      CEO and co-founder, Exabeam

  14. Victims or Villains: Intelligent Incident Response Can Save the Day

    Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  15. Longest Serving Member of the Team? Your Work Email Account

    When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  16. 2016 – The Year of the Cyber Exploit

    After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  17. The Cybersecurity Domino Effect

    The interlinked economy could be the biggest problem in security, and provide the weakest link.

    1. Ray Rothrock

      Chairman & CEO, RedSeal

  18. Shedding Light on the Dark Web

    The Government is to set up a task force to police the dark web.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  19. Is the Cyber Security Skills Gap Putting You in Danger?

    Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.

    1. Photo of Trevor Halstead

      Trevor Halstead

      ‎Product Specialist - Talent Services at Cybrary

  20. At Heart, We Are All Hacktivists

    Do ethics exist online, and whose determination is it on what is good and bad?

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

What’s hot on Infosecurity Magazine?