Infosecurity Opinions

  1. Dealing with Legacy Open Source—Issues and Solutions

    An alarming number of organizations consuming open source are not applying the patches they need

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  2. Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer

    The number of “bad bots” continues to grow.

    1. Photo of Andrew Useckas

      Andrew Useckas

      CTO at ThreatX

  3. #HowTo Make Security Expertise Accessible to Developers

    How security champion programs can make security expertise accessible to developers

    1. Photo of Dan Cornell

      Dan Cornell

      CTO and Principal, Denim Group

  4. Checkmate: Cybersecurity Strategy on the Modern Battlefield

    It is World Chess Day! What can modern cybersecurity learn from the game of chess?

    1. Photo of Rich  Turner

      Rich Turner

      Senior Vice-President EMEA, CyberArk

  5. How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World

    Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.

    1. Photo of Aaron Branson

      Aaron Branson

      Vice president of Marketing at Netsurion

  6. Cybersecurity Recuperation: Ensuring a Safe Return to Work

    Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.

    1. Photo of Geert van der Linden

      Geert van der Linden

      Executive Vice President of Cybersecurity, Capgemini

  7. Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

    Security teams need to exercise an awareness of what methods are becoming newly popular among bad actors

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  8. Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity

    Why compliance certifications prove that you uphold best industry practices

    1. Photo of Jordan MacAvoy

      Jordan MacAvoy

      VP of Marketing, Reciprocity Labs

  9. Using Threat Deception to Thwart Malicious Insiders

    Like death and taxes, malicious insiders are a certainty of life

    1. Photo of Gil Shulman

      Gil Shulman

      VP of Products, Illusive Networks

  10. Stop Ignoring Two-Factor Authentication Just Because You’re Lazy

    Laziness literally becomes the weakest point in their data protection systems

    1. Photo of Addison Shaw

      Addison Shaw

      Content Editor and Freelance Writer

  11. Improving Banking Experiences with Biometrics

    Using the correct biometrics will enable banks and financial institutions to enhance customer experiences

    1. Photo of Olga Ezzheva

      Olga Ezzheva

      Technical writer at Oxagile

  12. Data Exchange and Collaboration Can Bring Digital Forensics Down to Size

    Focusing on data exchange and collaboration can go a long way toward making swift data collection

    1. Photo of Daniel Young

      Daniel Young

      CEO, QuoLab

  13. An Unfortunate Reality for Virtualized Systems

    It is important that organizations recognize that virtualization and VMs are not flawless

    1. Photo of Philip Bridge

      Philip Bridge

      President, Ontrack

  14. A Concerning Proliferation of SIM-Swapping Fraud in Europe

    SIM swapping requires substantial effort and costs from attackers, so high net worth individuals are targeted.

    1. Photo of Austin Berglas

      Austin Berglas

      Global Head of Professional Services at BlueVoyant

  15. #HowTo Neutralize Wide-Area Network Cyber-Threats

    Proven measures to protect an enterprise WAN during a crisis and otherwise

    1. Photo of Mike Frane

      Mike Frane

      Vice president of product management for Windstream Enterprise

  16. Passwords Create More Vulnerabilities Than Ever

    As users suffer from password fatigue and default to password reuse, cyber-criminals are making it their mission to take advantage of this carelessness

    1. Photo of Carl Henriksen

      Carl Henriksen

      Founder & CEO, Oryx Align

  17. Is GDPR Really a Two-Year Success Story?

    To keep GDPR fit for purpose, a number of changes still need to be made and more clarity is needed

    1. Photo of Elle Todd

      Elle Todd

      Partner, Reed Smith LLP

  18. The Digital Generation Will Become the Cyber-Criminal’s Dream

    The first truly digital generation will bring different attitudes with them, including information sharing

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  19. The Pursuit of Productivity: DevOps, PrivacyOps and AIOps

    DevOps, PrivacyOps and AIOps have been in practice by the IT and data privacy sector

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  20. Platform as a Service Solutions Are Secure: Unless You Misconfigure Them

    PaaS has allowed anyone within an organization's information technology infrastructure to take charge of its governance

What’s hot on Infosecurity Magazine?