Infosecurity Opinions

  1. Business as (un)usual: Communicating During a Pandemic, and Beyond

    A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  2. #HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering

    Social engineering is also a matter of thinking out of the box

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  3. How the MSSPs Can Strive to be Detection Ninjas

    An MSSP engineers for both situational awareness and situational consistency.

    1. Photo of Pukhraj Singh

      Pukhraj Singh

      Product Owner, Cyber Threat Detection, SilverSky by BAE Systems

  4. The Bigger Perimeter Picture of #COVID19

    Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model

    1. Photo of Phil Allen

      Phil Allen

      VP EMEA, Ping Identity

  5. Reinventing the Role of the Tier 1 SOC Analyst

    Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  6. What Actually IS a Cyber Range, and How Has It Evolved?

    A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how

    1. Photo of Debbie Gordon

      Debbie Gordon

      CEO and Founder of Cloud Range Cyber

  7. Automating Security With Intelligence

    Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.

    1. Photo of Karen Levy

      Karen Levy

      Vice President, Product and Client Marketing, Recorded Future

  8. Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments

    Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.

    1. Photo of Chris Sherry

      Chris Sherry

      Regional Vice President EMEA, Forescout

  9. Preparing for Tomorrow: Cybersecurity in a Remote World

    The cost effective option of permanent remote working

    1. Photo of Chris Jenkins

      Chris Jenkins

      Sales Director, UK and Ireland, Proficio

  10. Is a Wiped Computer Truly Wiped?

    Just because data appears to be gone doesn’t mean that it really is

    1. Mike Savitz

      Principal Consultant, The Crypsis Group

  11. Why SASE Can be Your Solution in a Time of Uncertainty

    With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption

    1. Photo of Dave Martin

      Dave Martin

      Senior Director, Product Management of Threat Response at Open Systems

  12. The Key to Successfully Managing Cyber Risk: Speed

    No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.

    1. Photo of Grant Moerschel

      Grant Moerschel

      VP Product Marketing, SentinelOne

  13. RE: Thinking Email Security

    Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed

    1. Photo of Mariana  Pereira

      Mariana Pereira

      Director of Email Security Products, Darktrace

  14. The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives

    Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  15. Lessons From the World’s Crash-Course into Telecommuting During #COVID19

    A few weeks into the Covid-19 disruptions, some first-hand observations from the field that apply to organizations globally

    1. Photo of Shane Stephens

      Shane Stephens

      Senior Engineer, Forescout

  16. Zelle: A New Door Opens, But is Crime Walking In?

    Zelle fraud is the fastest growing area of account takeover fraud in the U.S. banking sector.

    1. Photo of Uri Rivner

      Uri Rivner

      Chief Cyber Officer, BioCatch

  17. #HowTo Secure Distributed Cloud Systems in Enterprise Environments

    How can organizations secure distributed cloud systems while maintaining efficiency?

    1. Photo of Soumik Sarkar

      Soumik Sarkar

      Chief Technology Officer & Co-Founder, Crosscode

  18. Steps to Implementing Voice Authentication and Securing Biometric Data

    What are the steps to implementing a voice verification system, and how should the voiceprint data be secured?

    1. Photo of Miroslav Jirků

      Miroslav Jirků

      VP of Marketing, Phonexia

  19. Debunking Myths about Quantum Cryptography

    Given how much data is stolen from U.S. industry and government, quantum could be a huge problem.

    1. Photo of John Prisco

      John Prisco

      CEO of Quantum Xchange

  20. Top Ways to Guard Against Work-from-Home Phishing Threats

    Best practices that can help raise awareness of potential phishing techniques and other scams

    1. Photo of A.N. Ananth

      A.N. Ananth

      Chief Strategy Officer at Netsurion

What’s hot on Infosecurity Magazine?