Infosecurity Opinions

  1. How Social Engineering is Changing the Insider Threat Game

    Social engineering attacks ultimately lead to a type of insider threat known as user error

    1. Peter Draper

      Technical director at Gurucul

  2. #HowTo Get the Most Out of Your Privileged Access Management Programme

    Enterprises should put thought into architecting a PAM program with a risk-based approach

    1. Photo of Anusha K.M.

      Anusha K.M.

      Product Consultant, ManageEngine

  3. Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?

    An advance on traditional segmentation that marries speed, innovation and improved security.

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  4. Is it Time to Resuscitate Prevention?

    Why data breaches are only inevitable if we continue to think of them as the new normal.

    1. Photo of Scott Scheferman

      Scott Scheferman

      Principal Security Technologist, SentinelOne

  5. Providing Cyber Defence Without Breaking The Bank

    An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  6. Collaborative Approaches to Security – Getting DevSecOps to Work

    Continuous intelligence data can help make DevSecOps a reality

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  7. When Malware Returns: Beating the Silent System Killer

    More than half of ransomware victims got hit a second (or more) time

    1. Photo of Yaniv Valik

      Yaniv Valik

      VP Product, Cyber and IT Resilience at Continuity Software

  8. Windows 7 is Ending -- Don't Put Yourself at Risk

    With only two months until the end of life date, waiting to address the issue will only increase the risk to your business

    1. Photo of Mike Puglia

      Mike Puglia

      CMO, Kaseya

  9. Shining a Light On Shadow IT

    What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists

    1. Photo of David Dunn

      David Dunn

      CISO, Duff & Phelps

  10. Patch-Perfect, But Still Vulnerable

    Vulnerability scanning is vital, but it’s no panacea

    1. Photo of Aviv Cohen

      Aviv Cohen

      CMO, Pcysys

  11. Can You Trust Your Own Code Anymore?

    This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  12. SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security

    Unfortunately, many SaaS providers enable SSO only for “enterprise” customers

    1. Photo of Lenny Zeltser

      Lenny Zeltser

      CISO, Axonius

  13. CISO - Don't Take it Personally But Make it Personal

    You need a lot more than technical knowledge and the ability to design roadmaps and execute projects

    1. Dror Hevlin

      Chief Information Security Officer, SolarEdge

  14. Address New Risks Without Adding Complexity

    There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  15. Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You

    The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs

    1. Photo of Jeremy Haas

      Jeremy Haas

      Chief Security Officer at LookingGlass Cyber Solutions

  16. Managed Security Services Shouldn’t Scare the SMB

    The MSSP model is now in financial reach for the SMB

    1. Photo of Mark Carl

      Mark Carl

      CEO, ControlScan

  17. Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?

    Is anti-virus facing the same future as the Okjökull glacier

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  18. Extending the “Circle of Trust” with Confidential Computing

    When an application starts to run, its data is vulnerable to a variety of attacks

    1. Photo of Richard Searle

      Richard Searle

      Senior Security Architect at Fortanix

  19. How AI is Revolutionizing the Banking Sector

    AI is becoming important for all businesses that rely heavily on data

    1. Oliver Smith

      Tech Writer, Shufti Pro

  20. #HowTo Migrate from SharePoint

    Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system

    1. Photo of Dave Jones

      Dave Jones

      VP of Marketing at AODocs

What’s hot on Infosecurity Magazine?