Infosecurity Opinions

  1. Longest Serving Member of the Team? Your Work Email Account

    When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  2. 2016 – The Year of the Cyber Exploit

    After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  3. The Cybersecurity Domino Effect

    The interlinked economy could be the biggest problem in security, and provide the weakest link.

    1. Ray Rothrock

      Chairman & CEO, RedSeal

  4. Shedding Light on the Dark Web

    The Government is to set up a task force to police the dark web.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  5. Is the Cyber Security Skills Gap Putting You in Danger?

    Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.

    1. Photo of Trevor Halstead

      Trevor Halstead

      ‎Product Specialist - Talent Services at Cybrary

  6. At Heart, We Are All Hacktivists

    Do ethics exist online, and whose determination is it on what is good and bad?

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  7. How should businesses deal with social media risks?

    There is a simple solution to the risks of social media, however; it might not be possible for many businesses.

    1. Photo of Ian Trump

      Ian Trump

      Security Lead for LogicNow

  8. The Need for Data Centric Security

    Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?

    1. Photo of Yoran Sirkis

      Yoran Sirkis

      CEO of Covertix

  9. Uncovering Covert Attack Communications Inside Your Network

    Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

    1. Photo of Hitesh Sheth

      Hitesh Sheth

      CEO of Vectra Networks

  10. For Enterprise Cybersecurity, Think Modern Metropolis, not Fortress

    Cybersecurity is less a fortress, and more of a metropolis—with porous and amorphous boundaries.

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  11. Bootstrap Businesses Should Follow These Principals to Survive

    When building a business, focus on transparency, flexibility, efficiency, responsibility and passion.

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  12. The Danger with Data in a Changing European Landscape

    Following the significant announcement of the GDPR, this has highlighted the importance of companies getting a handle on their data.

    1. Photo of Richard Munro

      Richard Munro

      Chief Technologist and Technical Director for vCloud Air EMEA, VMware, VMware

  13. Tackling The Impact Of Fraud By Utilising Machine Learning Tactics

    Fraudulent activity such as ‘account takeover’ and ‘application fraud target vulnerable people and fraud systems that rely on rules can’t keep up with changing attacks.

    1. Photo of Luke  Reynolds

      Luke Reynolds

      Director of Fraud, Featurespace

  14. How To Spot And Block Bad Bots

    Some website owners won’t do anything about bots, ultimately granting the bad bots unfettered access right alongside the good bots.

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  15. Hack Me: A Geopolitical Analysis of the Government Use of Surveillance Software

    Hacking Team-style methodologies represent a new era of cyber-espionage—and they’re on sale for any government willing to pay. This is where ethical ambiguity comes in.

    1. Photo of Adam McNeil

      Adam McNeil

      Malware Intelligence Analyst, Malwarebytes Labs

  16. Delivering On Data Privacy and Security

    Many people have pretty much accepted that everyone is spying on everyone. This has potentially very worrying consequences for the consumer, who is potentially vulnerable and has very little means of recourse.

    1. Photo of Nick Lambert

      Nick Lambert

      Chief Operating Officer, MaidSafe

  17. The Big Switch and Mobile Security

    The Big Switch showed us the value of centralization and how cloud computing is the application of an old logic. But this logic has been forgotten when it comes to mobile security and needs to be revitalized.

    1. Photo of Eldar Tuvey

      Eldar Tuvey

      co-founder and CEO, Wandera

  18. IoT requires strong authentication, paired with encryption, to succeed

    As we look to encrypt the IoT, we can’t overlook the need for strong, binding authentication to protect device access and user privacy

    1. Photo of Jason Sabin

      Jason Sabin

      Chief Security Officer, DigiCert

  19. Tackling Data Breach Impact: Machine Learning

    How can machine learning fraud systems provide a cutting-edge solution to protecting revenues and reputation?

    1. Photo of Luke Reynolds

      Luke Reynolds

      Director of Fraud, Featurespace

  20. Responding to insider threats

    More than one-third of all cybercrime incidents and security breaches are caused by insiders, each with individual motivations, but the common factor is inappropriate access to critical-value data. How do you design and implement an insider threat program

    1. Photo of Stuart Clarke

      Stuart Clarke

      Chief Technology Officer for Cybersecurity, Nuix

What’s hot on Infosecurity Magazine?