Infosecurity Opinions

  1. How Can Facebook Avoid the Wrath of the Regulator?

    Facebook has faced multiple privacy criticisms, how can it improve?

    1. Photo of Simon Orr

      Simon Orr

      Chief Scientific Officer, Exonar

  2. The Equifax Saga: It Could Happen Again. Don’t Let It

    Given the ongoing tensions between the US and China, it is unlikely that these government-run hacks will let up anytime soon

    1. Photo of Rami Sass

      Rami Sass

      CEO and Co-Founder of WhiteSource

  3. Power to the People

    There is still a widespread assumption that secure perimeter and air gapped networks are enough to protect critical systems.

    1. Photo of Ilan Barda

      Ilan Barda

      CEO, Radiflow

  4. The Security Misconceptions of Apple

    There are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms

    1. Photo of Jason Wudi

      Jason Wudi

      CTO, Jamf

  5. The CSI Effect Comes to Cybersecurity

    If audit logs provide all the answers, why are we still regularly hearing about cyber-attacks

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  6. Put a PIN in it: Why the Password vs. PIN Debate is Irrelevant

    The best solution: eliminating PINs and passwords altogether in favor of passwordless authentication

    1. Photo of Inbal Voitiz

      Inbal Voitiz

      VP of Marketing at Secret Double Octopus

  7. WannaCry – Please Meet #COVID19

    Will the Coronavirus bring computer and medical science together?

    1. Photo of Julian Tanner

      Julian Tanner

      Managing Partner, TUVA Partners

  8. Addressing Third Party Assessment Fatigue with Automation

    Companies are suffering from assessment fatigue

    1. Photo of Alex Hollis

      Alex Hollis

      VP, GRC Services at SureCloud

  9. Remote Workforce Security: Protecting People, Protecting the Enterprise

    Ensuring a number of top security and management practices are in play will be essential if firms are to protect their people – and the enterprise itself.

    1. Photo of Jay Ryerse

      Jay Ryerse

      CISSP, VP of Cybersecurity Initiatives at ConnectWise

  10. Building an Elegant Data Governance Solution Takes People and a Plan

    Organizations must be thoughtful in their approaches to security by building cathedrals of data governance — not just a few flimsy walls around their data kingdoms.

    1. Photo of Pete Thurston

      Pete Thurston

      Chief Product Officer and VP of Business Technology, RevCult

  11. The Missing Link in Cloud Security

    Cloud security isn't currently keeping up with the growth of cloud storage and adoption

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  12. Fraud Analytics and the Illusion of Asymmetric Insight

    Fraud Detection belongs to the class of problems with ‘adaptive adversaries’

    1. Photo of Debanjan Chatterjee

      Debanjan Chatterjee

      Fraud Analytics professional

  13. Safer Application Delivery with RASP

    As network security measures have grown increasingly mature, the front line of this battle has moved to the application layer

    1. Photo of Neil Correa

      Neil Correa

      Cyber Strategist, Micro Focus

  14. #HowTo Mitigate Phishing Risks

    Organizations turned to solutions, training, policies and techniques to protect themselves

    1. Photo of Hugh Pyle

      Hugh Pyle

      Director of Solutions Architecture, ReversingLabs

  15. Overconfidence and Under Education – Can Enterprises Ever be Secure?

    Security professionals must get data management right, as a single mistake is all it takes to permanently affect brand equity

    1. Photo of Alan Bentley

      Alan Bentley

      President of Global Strategy, Blancco

  16. COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?

    Amid national lockdowns and growing fear, governments are looking towards curbing the spread of the virus with unconventional means

    1. Photo of Itzhak Assaraf

      Itzhak Assaraf

      CTO at 1touch.io.

  17. If You’re in IT, Never Forget That You’re Also a Risk Manager

    Every information technologist, whatever their specialty or skill set, is a risk manager.

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

  18. Operationalizing NSA Guidance (or any Guidance, For That Matter!)

    How does one operationalize guidance from the NSA and other elite security organizations?

    1. Photo of Joe Vadakkan

      Joe Vadakkan

      Cloud Security Leader at Optiv Security

  19. Uncovering and Outlining Best Practices for Container Security

    Best practices for container security, and secure approaches when it comes to control, visibility, monitoring, and configuration.

    1. Tim Buntel

      VP of Application Security, Threat Stack

  20. How Close Will We Get to an Autonomous SOC in the Next Decade?

    This is what threat actors are counting on – amidst all this noise, their attempted incursion will be missed

    1. Ian Baxter

      Vice President of Pre-Sales Engineering, IRONSCALES

What’s hot on Infosecurity Magazine?