Infosecurity Opinions

  1. Data Exchange and Collaboration Can Bring Digital Forensics Down to Size

    Focusing on data exchange and collaboration can go a long way toward making swift data collection

    1. Photo of Daniel Young

      Daniel Young

      CEO, QuoLab

  2. An Unfortunate Reality for Virtualized Systems

    It is important that organizations recognize that virtualization and VMs are not flawless

    1. Photo of Philip Bridge

      Philip Bridge

      President, Ontrack

  3. A Concerning Proliferation of SIM-Swapping Fraud in Europe

    SIM swapping requires substantial effort and costs from attackers, so high net worth individuals are targeted.

    1. Photo of Austin Berglas

      Austin Berglas

      Global Head of Professional Services at BlueVoyant

  4. #HowTo Neutralize Wide-Area Network Cyber-Threats

    Proven measures to protect an enterprise WAN during a crisis and otherwise

    1. Photo of Mike Frane

      Mike Frane

      Vice president of product management for Windstream Enterprise

  5. Passwords Create More Vulnerabilities Than Ever

    As users suffer from password fatigue and default to password reuse, cyber-criminals are making it their mission to take advantage of this carelessness

    1. Photo of Carl Henriksen

      Carl Henriksen

      Founder & CEO, Oryx Align

  6. Is GDPR Really a Two-Year Success Story?

    To keep GDPR fit for purpose, a number of changes still need to be made and more clarity is needed

    1. Photo of Elle Todd

      Elle Todd

      Partner, Reed Smith LLP

  7. The Digital Generation Will Become the Cyber-Criminal’s Dream

    The first truly digital generation will bring different attitudes with them, including information sharing

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  8. The Pursuit of Productivity: DevOps, PrivacyOps and AIOps

    DevOps, PrivacyOps and AIOps have been in practice by the IT and data privacy sector

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  9. Platform as a Service Solutions Are Secure: Unless You Misconfigure Them

    PaaS has allowed anyone within an organization's information technology infrastructure to take charge of its governance

  10. Protecting Mobile Users: Why Wi-Fi 6 Offers Robust Security and Enhanced Usability

    Wi-Fi 6 features major security enhancements that have eliminated some of the weaknesses of older wi-fi technology

    1. Photo of Larry Lunetta

      Larry Lunetta

      Vice president, campus solutions marketing at Aruba, a Hewlett Packard Enterprise company

  11. Encryption Holds the Key for Avoiding Fines from Data Privacy Violations

    Regulatory bodies are establishing regulations to protect consumers’ personal data that is used in organizations.

    1. David Greene

      Chief Revenue Officer, Fortanix

  12. Myth Busting on Biometric Authentication

    Debunking five common myths and demonstrate the reality of how biometrics can keep us more secure

    1. Photo of Sam Bakken

      Sam Bakken

      Senior Product Marketing Manager, OneSpan

  13. No Better Time to Propose U.S. Consumer Data Privacy and Security Act

    Looking at the recently proposed U.S. Consumer Data Privacy & Security Act.

    1. Photo of Chris Jordan

      Chris Jordan

      CEO of Fluency Security

  14. Bridging the GRC and Security Divide

    If you had to categorize the relationship between GRC and cyber, you’d at best have to say: ‘it’s complicated.’

    1. Photo of Charaka Goonatilake

      Charaka Goonatilake

      CTO, Panaseer

  15. SIM Swap - The Silent Hacker

    A SIM swap can be the first identifier that a breach has happened.

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  16. #HowTo Not Make Backups: Do You Really Want to Protect Your Data?

    Although backups are a critical element of incident response, they can be used against companies unless set up properly.

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  17. Improving Email Security is About Disguising a Secure Solution as Email, Not Trying to Fix its Protocols

    Typical email protocols lack a lot of features that are essential from a security and privacy perspective

    1. Photo of Rick Goud

      Rick Goud

      CEO and Co-Founder, Zivver

  18. VPN Split-Tunneling – To Enable or Not To Enable

    How VPN split-tunneling can create additional risks and benefits to entities utilizing VPNs.

    1. Photo of Eric Jeffery

      Eric Jeffery

      Sr. Managing Consultant and Solutions Architect, IBM Security

  19. Cybercrime Has Undergone an Industrial Revolution – How to Keep Up

    Knowing how cyber-criminals use the services can provide an understanding of the threats they’re up against.

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  20. Who Owns Responsibility for Industrial Cybersecurity?

    Securing CNI is often considered to be a joint responsibility between the private and public sectors.

    1. Photo of Galina Antova

      Galina Antova

      Chief business development officer and co-founder of Claroty.

What’s hot on Infosecurity Magazine?