Infosecurity Opinions

  1. Onslaught of Login (Brute Force) Attacks Shakes Enterprise IT Security

    Brute force is an old method of attack but is still effective

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  2. Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey

    The consequences of privileged identity exposure are potentially catastrophic, as the Twitter hack demonstrated.

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  3. How Hybrid Learning is Changing K-12 Cybersecurity

    It’s up to everyone to keep cybersecurity, student safety, and data privacy top-of-mind through this shift.

    1. Photo of Charlie Sander

      Charlie Sander

      CEO, ManagedMethods

  4. Securing Remote Desktops During a Pandemic

    Remote work is needed to ensure everyone has the flexibility they need to be productive under unpredictable circumstances.

    1. Photo of Mike Jumper

      Mike Jumper

      CEO of Glyptodon, PMC Chair of Apache Guacamole

  5. Renew Your Vulnerability Management Program

    Organizations should invest in vulnerability scanning solutions to gain visibility into all assets and vulnerabilities.

    1. Photo of John Ayers

      John Ayers

      Chief Strategy Product Officer, Nuspire

  6. Maintaining Remote Workforce Productivity Without Peaking Privacy Concerns

    COVID-19 has generated a new surge in popularity for surveillance technologies

    1. Photo of David McGeough

      David McGeough

      Director of International Marketing at Wrike

  7. Compromised Devices Await Office Return to Strike

    Remote working has also put an increased focus on identity access management, credential theft, and privilege escalation

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  8. Is Your Organization Ready to Defend Insider Threats?

    How can you assess your organization’s readiness to detect and respond to an Insider threat attack?

    1. Photo of Henry  Hon

      Henry Hon

      Manager (Cyber Defense), KPMG

  9. Sleepwalking into a Cybersecurity Nightmare?

    Now is the time for investing in and implementing technologies

    1. Photo of John Vladimir Slamecka

      John Vladimir Slamecka

      EMEA & LatAm President, AT&T Business

  10. Making Cybersecurity a Priority in the Boardroom

    The top five cybersecurity governance challenges, and levers to solve them

    1. Photo of Phil Cracknell

      Phil Cracknell

      Consultant

  11. #HowTo Create a Budget-Friendly Security Testing Program

    Compromising on application security testing can have serious implications, and it is important to not skip it.

    1. Photo of Mark Horvath

      Mark Horvath

      Senior Research Director, Gartner

  12. The Glaring Vulnerabilities in Power Distribution Networks Today

    Legacy industrial control system protocols are commonly used throughout power systems, and have little or no security measures and lack authentication capabilities.

    1. Photo of Elad Ben-Meir

      Elad Ben-Meir

      CEO, SCADAfence

  13. Web Application Threats: Mapping Out Your Attack Surface

    Security teams must gain a better understanding of weakness in their application architecture in order to reduce their overall attack surface.

    1. Photo of Stephane Konarkowski

      Stephane Konarkowski

      Senior Security Consultant, Outpost24

  14. A CISO For The 2020s – More Than Just a Dashboard Driver

    The CISO of 2020 is one who is aware of all this and is willing to innovate.

    1. Photo of Paul Edon

      Paul Edon

      Senior Director (EMEA), Tripwire

  15. Vaccine Developers are at Risk: How to Fight Hackers and Address the Health Crisis

    Pharmaceutical organizations researching a vaccine are taking the right steps toward a strong security posture

    1. Photo of Jake Olcott

      Jake Olcott

      Vice President of Government Affairs at BitSight

  16. COVID-19 Vs Data Center? Best Practices to Weather the Storm!

    How the shift will affect data center operators and what they can do to efficiently tackle it

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  17. Overcoming the Ongoing Exploitation of Vulnerabilities

    Looking at 2020 data to determine what cyber-criminals actions have been

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  18. Commercializing Health Data: Where do we Draw the Line?

    What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?

    1. Photo of Adam Kujawa

      Adam Kujawa

      Director, Malwarebytes

  19. COVID-19 Demonstrates Need for Human Error-Proof Security

    80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security

    1. Photo of Nigel Thompson

      Nigel Thompson

      VP, BlackBerry

  20. How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy

    There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.

    1. Photo of Elliot Dellys

      Elliot Dellys

      EMEA Director of Strategic Consulting, Trustwave

What’s hot on Infosecurity Magazine?