Infosecurity Opinions

  1. Demand More Achievement in Cybersecurity

    We need automated measures of effectiveness relative to operationalized cybersecurity

    1. Photo of Jesse K. Dean

      Jesse K. Dean

      Senior Director of Solutionsm TDI

  2. Why Password-based Single Sign-On is a Bad Idea

    It all comes down to trust.

    1. Photo of Ori Eisen

      Ori Eisen

      CEO of Trusona

  3. The Internet Is Growing, and so Is Your Attack Surface

    A company’s attack surface sprawls across the open internet, making attack surface management a critical component

    1. Photo of Dan Schoenbaum

      Dan Schoenbaum

      President and COO of RiskIQ

  4. The Three Cyber Attacks Ruining Your Holiday Spirit

    Three types of cyber attack to watch out for during the holiday season

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  5. Calculating the True Cost of a SOC

    Under-staffed IT and security teams can create more security risk than most companies realize.

    1. Photo of Alex Jinivizian

      Alex Jinivizian

      Vice President Strategy & Corporate Development, eSentire

  6. Expanding Biometric Use in Government

    Biometrics, similar to passwords, PINs and bankcards, are a credential

    1. Photo of George Avetisov

      George Avetisov

      CEO of HYPR

  7. Illuminate Dark Data and Avoid Severe Security Risks

    Nearly 90% of all data is dark, meaning it’s sitting unused by the organizations that collect it.

    1. Photo of Pete Thurston

      Pete Thurston

      Chief Product Officer and VP of Business Technology, RevCult

  8. A Tricky Transition: Why Organizations Struggle with Secure, Multi-Cloud Migrations

    On average, they are leveraging nearly five clouds.

    1. Photo of Onkar Birk

      Onkar Birk

      SVP, Product Strategy & Engineering, Alert Logic

  9. Identifying and Defending Against Harmful Content

    ‘Not Safe For Work’ content is a more prevalent and complex issue than ever before.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  10. Risk in Retail: Staying on the Right Side of the Headlines

    How can retailers survive in a connected and risky world?

    1. Photo of Todd Wade

      Todd Wade

      Principal Consultant, CRMG

  11. A Familiar Foe — Preventing Ransomware’s Resurgence

    For hackers able to identify and infiltrate systems that are lagging behind, however, the payday is still high

    1. Photo of Kris Lahiri

      Kris Lahiri

      CSO, Egnyte

  12. Addressing the C-suite Access Issue

    The higher up the individual, the bigger the risk

    1. Photo of Charaka Goonatilake

      Charaka Goonatilake

      CTO, Panaseer

  13. #HowTo Have Better Open Source Security for the Financial Services Sector

    How financial services organizations can use more open source code risk-free

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  14. Winning the Cybersecurity Battle with Open Networking

    The best defense policy is one that is pre-emptively implemented before any attack

    1. Photo of Pete Lumbis

      Pete Lumbis

      Technical Evangelist, Cumulus Networks

  15. Why I Don't Blame Boards for Underinvesting in Cybersecurity

    Security professionals need to present boards with something much more arresting: metrics and indicators

    1. Photo of John Blythe

      John Blythe

      Head of Behavioural Science, CybSafe

  16. We’re Going to Need a Better Plan

    Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.

    1. Photo of Ilan Barda

      Ilan Barda

      CEO, Radiflow

  17. Combining Threat Playbooks with AI to Stop Cyber-Criminals

    Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  18. A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth

    Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.

    1. Photo of Paul Kleinschnitz

      Paul Kleinschnitz

      Executive Vice President, Coalfire

  19. Proactively Protecting Sensitive Data

    Traditional cybersecurity defenses are insufficient, as the steady stream of data breaches indicates

    1. Photo of Ryan Smith

      Ryan Smith

      vice president, global business development, Futurex

  20. Building a Cyber Risk Report Your Board Will Love

    Cyber risk has emerged as one of the top risks to the enterprise so CISOs are being asked to report more frequently to the board

    1. Photo of Nick Sanna

      Nick Sanna

      CEO, RiskLens

What’s hot on Infosecurity Magazine?