Infosecurity Opinions

  1. Victims or Villains: Intelligent Incident Response Can Save the Day

    Data breaches are happening with greater frequency, and are compromising larger volumes of data, than ever before and response is now key.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  2. Longest Serving Member of the Team? Your Work Email Account

    When an employee leaves, their work email survives. What measures are you putting into place to make sure that filtering is done.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  3. 2016 – The Year of the Cyber Exploit

    After breaches in 2015, 2016 will be considered the ‘year of the exploit’ as we will see a shift to higher impact cybercrime.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  4. The Cybersecurity Domino Effect

    The interlinked economy could be the biggest problem in security, and provide the weakest link.

    1. Ray Rothrock

      Chairman & CEO, RedSeal

  5. Shedding Light on the Dark Web

    The Government is to set up a task force to police the dark web.

    1. Photo of Paul Stokes

      Paul Stokes

      COO of Wynyard Group

  6. Is the Cyber Security Skills Gap Putting You in Danger?

    Cyber attacks have the potential to disrupt governments, destroy businesses, and put our personal safety in jeopardy. Yet this critical sector of the technology world suffers from a severe deficit of skilled workers to fill its jobs.

    1. Photo of Trevor Halstead

      Trevor Halstead

      ‎Product Specialist - Talent Services at Cybrary

  7. At Heart, We Are All Hacktivists

    Do ethics exist online, and whose determination is it on what is good and bad?

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  8. How should businesses deal with social media risks?

    There is a simple solution to the risks of social media, however; it might not be possible for many businesses.

    1. Photo of Ian Trump

      Ian Trump

      Security Lead for LogicNow

  9. The Need for Data Centric Security

    Protecting data is more of a challenge with mobile devices, so how do you protect a piece of data once it leaves the person who created it?

    1. Photo of Yoran Sirkis

      Yoran Sirkis

      CEO of Covertix

  10. Uncovering Covert Attack Communications Inside Your Network

    Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

    1. Photo of Hitesh Sheth

      Hitesh Sheth

      CEO of Vectra Networks

  11. For Enterprise Cybersecurity, Think Modern Metropolis, not Fortress

    Cybersecurity is less a fortress, and more of a metropolis—with porous and amorphous boundaries.

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  12. Bootstrap Businesses Should Follow These Principals to Survive

    When building a business, focus on transparency, flexibility, efficiency, responsibility and passion.

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  13. The Danger with Data in a Changing European Landscape

    Following the significant announcement of the GDPR, this has highlighted the importance of companies getting a handle on their data.

    1. Photo of Richard Munro

      Richard Munro

      Chief Technologist and Technical Director for vCloud Air EMEA, VMware, VMware

  14. Tackling The Impact Of Fraud By Utilising Machine Learning Tactics

    Fraudulent activity such as ‘account takeover’ and ‘application fraud target vulnerable people and fraud systems that rely on rules can’t keep up with changing attacks.

    1. Photo of Luke  Reynolds

      Luke Reynolds

      Director of Fraud, Featurespace

  15. How To Spot And Block Bad Bots

    Some website owners won’t do anything about bots, ultimately granting the bad bots unfettered access right alongside the good bots.

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  16. Hack Me: A Geopolitical Analysis of the Government Use of Surveillance Software

    Hacking Team-style methodologies represent a new era of cyber-espionage—and they’re on sale for any government willing to pay. This is where ethical ambiguity comes in.

    1. Photo of Adam McNeil

      Adam McNeil

      Malware Intelligence Analyst, Malwarebytes Labs

  17. Delivering On Data Privacy and Security

    Many people have pretty much accepted that everyone is spying on everyone. This has potentially very worrying consequences for the consumer, who is potentially vulnerable and has very little means of recourse.

    1. Photo of Nick Lambert

      Nick Lambert

      Chief Operating Officer, MaidSafe

  18. The Big Switch and Mobile Security

    The Big Switch showed us the value of centralization and how cloud computing is the application of an old logic. But this logic has been forgotten when it comes to mobile security and needs to be revitalized.

    1. Photo of Eldar Tuvey

      Eldar Tuvey

      co-founder and CEO, Wandera

  19. IoT requires strong authentication, paired with encryption, to succeed

    As we look to encrypt the IoT, we can’t overlook the need for strong, binding authentication to protect device access and user privacy

    1. Photo of Jason Sabin

      Jason Sabin

      Chief Security Officer, DigiCert

  20. Tackling Data Breach Impact: Machine Learning

    How can machine learning fraud systems provide a cutting-edge solution to protecting revenues and reputation?

    1. Photo of Luke Reynolds

      Luke Reynolds

      Director of Fraud, Featurespace

What’s hot on Infosecurity Magazine?