Infosecurity Opinions

  1. Is TikTok a Cybersecurity Threat?

    There are concerns about TikTok, so what can we do about them?

  2. Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains

    Attackers are increasingly looking to target people while they are travelling

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  3. Why Businesses Need to Re-Think Network Monitoring in 2020

    The current approach to network security is significantly flawed on two counts

    1. Photo of Ivan Blesa

      Ivan Blesa

      Head of Product, Noble

  4. What Does the Hack Back Bill Mean to Your Business?

    There is often vagueness in the language of new bills, especially when they are still in draft form.

    1. Photo of Chris Kennedy

      Chris Kennedy

      CISO and VP of customer success at AttackIQ

  5. How the Real Business Killer is Having Nothing on the Shelves

    While ransomware is certainly a current problem for targeted businesses, downtime is a seasoned business killer

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  6. Call in the White Hats — It’s Time to Reboot External Testing

    Businesses should be cycling through new testers every so often, so that attackers can push at different doors.

    1. Photo of Bojan Simic

      Bojan Simic

      Cofounder and CTO, HYPR

  7. How Social Engineering is Changing the Insider Threat Game

    Social engineering attacks ultimately lead to a type of insider threat known as user error

    1. Peter Draper

      Technical director at Gurucul

  8. #HowTo Get the Most Out of Your Privileged Access Management Programme

    Enterprises should put thought into architecting a PAM program with a risk-based approach

    1. Photo of Anusha K.M.

      Anusha K.M.

      Product Consultant, ManageEngine

  9. Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?

    An advance on traditional segmentation that marries speed, innovation and improved security.

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  10. Is it Time to Resuscitate Prevention?

    Why data breaches are only inevitable if we continue to think of them as the new normal.

    1. Photo of Scott Scheferman

      Scott Scheferman

      Principal Security Technologist, SentinelOne

  11. Providing Cyber Defence Without Breaking The Bank

    An all seeing, listening, controlling and speaking Shield has to be a game changer in the cyber defense armory

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  12. Collaborative Approaches to Security – Getting DevSecOps to Work

    Continuous intelligence data can help make DevSecOps a reality

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  13. When Malware Returns: Beating the Silent System Killer

    More than half of ransomware victims got hit a second (or more) time

    1. Photo of Yaniv Valik

      Yaniv Valik

      VP Product, Cyber and IT Resilience at Continuity Software

  14. Windows 7 is Ending -- Don't Put Yourself at Risk

    With only two months until the end of life date, waiting to address the issue will only increase the risk to your business

    1. Photo of Mike Puglia

      Mike Puglia

      CMO, Kaseya

  15. Shining a Light On Shadow IT

    What I can't fix and what I can't solve is IT infrastructure and code when I don't know that it exists

    1. Photo of David Dunn

      David Dunn

      CISO, Duff & Phelps

  16. Patch-Perfect, But Still Vulnerable

    Vulnerability scanning is vital, but it’s no panacea

    1. Photo of Aviv Cohen

      Aviv Cohen

      CMO, Pcysys

  17. Can You Trust Your Own Code Anymore?

    This leads us to the main issue: the lack of privilege separation in the JavaScript ecosystem.

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  18. SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security

    Unfortunately, many SaaS providers enable SSO only for “enterprise” customers

    1. Photo of Lenny Zeltser

      Lenny Zeltser

      CISO, Axonius

  19. CISO - Don't Take it Personally But Make it Personal

    You need a lot more than technical knowledge and the ability to design roadmaps and execute projects

    1. Dror Hevlin

      Chief Information Security Officer, SolarEdge

  20. Address New Risks Without Adding Complexity

    There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

What’s hot on Infosecurity Magazine?