Infosecurity Opinions

  1. Educating Non-Technical Employees on the Risks Of Shadow IT

    Shadow IT is becoming more of a prevalent risk for a few reasons

    1. Photo of Michael Schenck

      Michael Schenck

      Director of Security Services at Kaytuso

  2. Ransomware is Putting Smart City Aspirations on Notice

    Current cybersecurity solutions are not able to cost-effectively scale in order to fully monitor the burgeoning networks.

    1. Photo of Eyal Elyashiv

      Eyal Elyashiv

      CEO & Co-founder, Cynamics

  3. Insecure Loyalty Points are the Dark Web’s New Currency

    Businesses need to treat their loyalty point schemes more like bank accounts

    1. Photo of Andy Still

      Andy Still

      CTO, Netacea

  4. A Risky Misconception – Understanding Supplier Risk Profiles

    We’ve identified 5 steps to help companies mitigate the risk caused by outside suppliers.

    1. Photo of Nick Frost

      Nick Frost

      Director of Cyber Risk Management Group (CRMG)

  5. Pros and Cons of Multi-Model DBs to Store Threat Intelligence Data

    The pros and cons of storing STIX data in relational databases

    1. Photo of Georges Bossert

      Georges Bossert

      IT cybersecurity specialist and leader of the product development activities at SEKOIA

    2. Photo of Raphael Cohen

      Raphael Cohen

      senior backend developer working at SEKOIA on the SEKOIA.IO platform

  6. Why DPAs Need Deeper Attention

    Why we need to pay more attention to data processing agreements

    1. Kate Bronstein

      DPO in an international corporation

  7. Is the CCPA the Beginning of a Move to Supra-National Legislation?

    In light of the General Data Protection Regulation and the California Consumer Privacy Act, is this the beginning of a move to supra-national legislation?

    1. Photo of Sarah Pearce

      Sarah Pearce

      Partner, Hunton Andrews Kurth LLP

    2. Ashley Webber

      Associate, Paul Hastings

  8. Which Issues Can DataOps Solve?

    This means incorporating DevOps and data management staff into a collaborative team.

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  9. #HowTo Do DevOps Effectively

    DevOps is a practice that aims at merging quality assurance, development, and operations

    1. Photo of Slava Vaniukov

      Slava Vaniukov

      CEO & co-founder at Softermii

  10. Defending Against State-Sponsored Hackers

    No one is safe, and professionals need to think about their risk management strategy

    1. Photo of Chris Kennedy

      Chris Kennedy

      CISO and VP of customer success at AttackIQ

  11. Is Anyone Paying Attention to Healthcare Security?

    How much worse does it need to get for us to begin acting responsibly?

    1. Photo of Safi Oranski

      Safi Oranski

      VP of Business Development at CyberMDX

  12. Why Leaky Clouds Lead to Data Breaches

    We’re bound to see more of these breaches in the future even though they’re easy to avoid

    1. Photo of Dean Sysman

      Dean Sysman

      CEO and co-founder, Axonius

  13. 2020 – An Opportunity in Counterintelligence and Deception

    Deception helps address the two primary barriers to breach protection

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  14. Managing the Public Cloud in 2020

    The public cloud is crucial for modern organizations looking to digitally transform their business, yet security in that area remains a hurdle

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  15. Are You Prepared to Battle Account Takeover Fraud?

    Security measures that will help you assess your capacity to battle account takeover fraud.

    1. Oliver Smith

      Tech Writer, Shufti Pro

  16. Common Cloud, Container and Control Mistakes to Avoid in 2020

    Three common – and critical – mistakes made by CISOs and CSOs.

    1. Photo of Sean Lutner

      Sean Lutner

      Infrastructure architect, Edgewise Networks

  17. Why Private DNA Testing is a Threat to Our Privacy

    Existing regulations are not enough to fully protect a person’s genetic data

    1. Photo of Dean Chester

      Dean Chester

      CEO and Cyber Expert, CoolTechZone

  18. With Third-Party Providers, Trust is in Short Supply

    Innovation, therefore, increasingly necessitates outsourcing.

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  19. The Five States of Compliance Maturity: Building a Strong Training Strategy

    A comprehensive training strategy can result in major, long-term dividends.

    1. Photo of Andy Nickolls

      Andy Nickolls

      Senior Director of Compliance EMEA at Skillsoft

  20. #HowTo Deal with Apple Ransomware

    In contrast to a widespread misconception, Mac computers are susceptible to ransomware and other types of predatory code

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

What’s hot on Infosecurity Magazine?