Infosecurity Opinions

  1. A Cybersecurity Culture Score

    Looking at the Business Model for Information Security, a way of thinking about information security in a holistic way.

    1. Photo of Ranjit Bhaskar

      Ranjit Bhaskar

      Sr. Security Architect, TWIA

  2. The Future for Network Security: What Does SASE Bring to the Table?

    As part of an overall digital business transformation, organizations will look to SASE

    1. Photo of Yair Green

      Yair Green

      CTO of GlobalDots

  3. Keeping Data Secure in the Always-On World

    Despite the proliferation of sophisticated cyber breaches, always-on availability is a consideration many IT leaders are not prioritizing

    1. Photo of Michael Cade

      Michael Cade

      Senior Global Technologist at Veeam

  4. Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough

    The most frustrating part of Wawa’s story? That it could’ve been prevented

    1. Photo of Jeff Sakasegawa

      Jeff Sakasegawa

      Trust & Safety Architect, Sift

  5. A First-Class Feature: Security in the Era of Worker Data

    As industries adopt data-rich wearable technologies, it’s imperative that security be prioritized as a first-class feature.

    1. Photo of Bryant Eadon

      Bryant Eadon

      Chief Information Officer, StrongArm Technologies

  6. Push Security to the Edge: Overcoming Edge Computing Challenges

    The best attacks are the ones you never see coming

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  7. Time to Stop Overlooking DNS Security

    For the internet to be secure, DNSSEC should be widely deployed

    1. Photo of Mark Fieldhouse

      Mark Fieldhouse

      general manager EMEA, NS1

  8. Why SSL Encryption Will not Become a Victim of its Own Success

    This level of security is an essential feature of online data exchange

    1. Photo of Luc van Deuren

      Luc van Deuren

      Solutions Architect Northern Europe, Zscaler

  9. Detecting Spear Phishing: Sophisticated Attacks Require a Sophisticated Defense

    Many email security approaches now rely on machine learning, in addition to heuristics.

    1. Photo of Joshua Saxe

      Joshua Saxe

      Chief Scientist, Sophos

  10. #HowTo Be Sure You Choose a Safe and Secure Hosting Provider

    Six data security questions to ask when review and choose your next hosting provider

    1. Photo of Deana Kovač

      Deana Kovač

      Internet Marketing Specialist and Content Writer

  11. A Siri for Network Security: How Chatbots can Enhance Business Agility

    The benefits of network security chatbots in saving time and accelerating processes

    1. Photo of Dania Ben-Peretz

      Dania Ben-Peretz

      Product Manager, AlgoSec

  12. How the Cloud Complicates the Digital Crime Scene

    In short, it is very similar to any other form of forensics

  13. Educating Non-Technical Employees on the Risks Of Shadow IT

    Shadow IT is becoming more of a prevalent risk for a few reasons

    1. Photo of Michael Schenck

      Michael Schenck

      Director of Security Services at Kaytuso

  14. Ransomware is Putting Smart City Aspirations on Notice

    Current cybersecurity solutions are not able to cost-effectively scale in order to fully monitor the burgeoning networks.

    1. Photo of Eyal Elyashiv

      Eyal Elyashiv

      CEO & Co-founder, Cynamics

  15. Insecure Loyalty Points are the Dark Web’s New Currency

    Businesses need to treat their loyalty point schemes more like bank accounts

    1. Photo of Andy Still

      Andy Still

      CTO, Netacea

  16. A Risky Misconception – Understanding Supplier Risk Profiles

    We’ve identified 5 steps to help companies mitigate the risk caused by outside suppliers.

    1. Photo of Nick Frost

      Nick Frost

      Director of Cyber Risk Management Group (CRMG)

  17. Pros and Cons of Multi-Model DBs to Store Threat Intelligence Data

    The pros and cons of storing STIX data in relational databases

    1. Photo of Georges Bossert

      Georges Bossert

      IT cybersecurity specialist and leader of the product development activities at SEKOIA

    2. Photo of Raphael Cohen

      Raphael Cohen

      senior backend developer working at SEKOIA on the SEKOIA.IO platform

  18. Why DPAs Need Deeper Attention

    Why we need to pay more attention to data processing agreements

    1. Kate Bronstein

      DPO in an international corporation

  19. Is the CCPA the Beginning of a Move to Supra-National Legislation?

    In light of the General Data Protection Regulation and the California Consumer Privacy Act, is this the beginning of a move to supra-national legislation?

    1. Photo of Sarah Pearce

      Sarah Pearce

      Partner, Hunton Andrews Kurth LLP

    2. Ashley Webber

      Associate, Paul Hastings

  20. Which Issues Can DataOps Solve?

    This means incorporating DevOps and data management staff into a collaborative team.

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

What’s hot on Infosecurity Magazine?