Infosecurity Opinions

  1. Securing Active Directory

    Every computer on the company’s network must have some level of access to AD for the network environment to function correctly.

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  2. Losing the Human Touch to Protect Data

    Why it is important to remove users from the equation if we want to protect data and deliver inherent security

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  3. Delving Into the Weaponization of AI

    To the surprise of almost no-one, AI is being weaponized by cyber adversaries.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  4. No Time for Email Protection Roulette

    Extra caution should be exercised when safeguarding not just what’s coming in, but also what’s going out, via email.

    1. Photo of Jamie Manuel

      Jamie Manuel

      VP Product Management, Titus

  5. Dealing with Legacy Open Source—Issues and Solutions

    An alarming number of organizations consuming open source are not applying the patches they need

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  6. Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer

    The number of “bad bots” continues to grow.

    1. Photo of Andrew Useckas

      Andrew Useckas

      CTO at ThreatX

  7. #HowTo Make Security Expertise Accessible to Developers

    How security champion programs can make security expertise accessible to developers

    1. Photo of Dan Cornell

      Dan Cornell

      CTO and Principal, Denim Group

  8. Checkmate: Cybersecurity Strategy on the Modern Battlefield

    It is World Chess Day! What can modern cybersecurity learn from the game of chess?

    1. Photo of Rich  Turner

      Rich Turner

      Senior Vice-President EMEA, CyberArk

  9. How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World

    Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.

    1. Photo of Aaron Branson

      Aaron Branson

      Vice president of Marketing at Netsurion

  10. Cybersecurity Recuperation: Ensuring a Safe Return to Work

    Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.

    1. Photo of Geert van der Linden

      Geert van der Linden

      Executive Vice President of Cybersecurity, Capgemini

  11. Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

    Security teams need to exercise an awareness of what methods are becoming newly popular among bad actors

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  12. Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity

    Why compliance certifications prove that you uphold best industry practices

    1. Photo of Jordan MacAvoy

      Jordan MacAvoy

      VP of Marketing, Reciprocity Labs

  13. Using Threat Deception to Thwart Malicious Insiders

    Like death and taxes, malicious insiders are a certainty of life

    1. Photo of Gil Shulman

      Gil Shulman

      VP of Products, Illusive Networks

  14. Stop Ignoring Two-Factor Authentication Just Because You’re Lazy

    Laziness literally becomes the weakest point in their data protection systems

    1. Photo of Addison Shaw

      Addison Shaw

      Content Editor and Freelance Writer

  15. Improving Banking Experiences with Biometrics

    Using the correct biometrics will enable banks and financial institutions to enhance customer experiences

    1. Photo of Olga Ezzheva

      Olga Ezzheva

      Technical writer at Oxagile

  16. Data Exchange and Collaboration Can Bring Digital Forensics Down to Size

    Focusing on data exchange and collaboration can go a long way toward making swift data collection

    1. Photo of Daniel Young

      Daniel Young

      CEO, QuoLab

  17. An Unfortunate Reality for Virtualized Systems

    It is important that organizations recognize that virtualization and VMs are not flawless

    1. Photo of Philip Bridge

      Philip Bridge

      President, Ontrack

  18. A Concerning Proliferation of SIM-Swapping Fraud in Europe

    SIM swapping requires substantial effort and costs from attackers, so high net worth individuals are targeted.

    1. Photo of Austin Berglas

      Austin Berglas

      Global Head of Professional Services at BlueVoyant

  19. #HowTo Neutralize Wide-Area Network Cyber-Threats

    Proven measures to protect an enterprise WAN during a crisis and otherwise

    1. Photo of Mike Frane

      Mike Frane

      Vice president of product management for Windstream Enterprise

  20. Passwords Create More Vulnerabilities Than Ever

    As users suffer from password fatigue and default to password reuse, cyber-criminals are making it their mission to take advantage of this carelessness

    1. Photo of Carl Henriksen

      Carl Henriksen

      Founder & CEO, Oryx Align

What’s hot on Infosecurity Magazine?