Infosecurity Opinions

  1. Identifying and Defending Against Harmful Content

    ‘Not Safe For Work’ content is a more prevalent and complex issue than ever before.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  2. Risk in Retail: Staying on the Right Side of the Headlines

    How can retailers survive in a connected and risky world?

    1. Photo of Todd Wade

      Todd Wade

      Principal Consultant, CRMG

  3. A Familiar Foe — Preventing Ransomware’s Resurgence

    For hackers able to identify and infiltrate systems that are lagging behind, however, the payday is still high

    1. Photo of Kris Lahiri

      Kris Lahiri

      CSO, Egnyte

  4. Addressing the C-suite Access Issue

    The higher up the individual, the bigger the risk

    1. Photo of Charaka Goonatilake

      Charaka Goonatilake

      CTO, Panaseer

  5. #HowTo Have Better Open Source Security for the Financial Services Sector

    How financial services organizations can use more open source code risk-free

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  6. Winning the Cybersecurity Battle with Open Networking

    The best defense policy is one that is pre-emptively implemented before any attack

    1. Photo of Pete Lumbis

      Pete Lumbis

      Technical Evangelist, Cumulus Networks

  7. Why I Don't Blame Boards for Underinvesting in Cybersecurity

    Security professionals need to present boards with something much more arresting: metrics and indicators

    1. Photo of John Blythe

      John Blythe

      Head of Behavioural Science, CybSafe

  8. We’re Going to Need a Better Plan

    Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.

    1. Photo of Ilan Barda

      Ilan Barda

      CEO, Radiflow

  9. Combining Threat Playbooks with AI to Stop Cyber-Criminals

    Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  10. A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth

    Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.

    1. Photo of Paul Kleinschnitz

      Paul Kleinschnitz

      Executive Vice President, Coalfire

  11. Proactively Protecting Sensitive Data

    Traditional cybersecurity defenses are insufficient, as the steady stream of data breaches indicates

    1. Photo of Ryan Smith

      Ryan Smith

      vice president, global business development, Futurex

  12. Building a Cyber Risk Report Your Board Will Love

    Cyber risk has emerged as one of the top risks to the enterprise so CISOs are being asked to report more frequently to the board

    1. Photo of Nick Sanna

      Nick Sanna

      CEO, RiskLens

  13. How Traditional SIEM Pricing Models Hamper Security

    Traditional pricing models have so far been restrictive to security scalability

    1. Photo of Ross Brewer

      Ross Brewer

      VP and MD for international markets, LogRhythm

  14. Why Are Security and Business Goals at Odds With Each Other?

    CISOs need to take the time to listen to what the priorities of others in the business are and what they consider to be measures of success.

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  15. Combining Threat Playbooks with AI to Stop Cyber-Criminals

    Understanding the tactics, techniques, and procedures of cyber-criminals has been one of the most difficult and elusive elements of threat intelligence

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  16. #HowTo Ensure Hybrid Cloud Security with Secure Endpoints

    Anywhere/anytime computing is a reality.

    1. Photo of Ken Galvin

      Ken Galvin

      Senior Product Manager for KACE System Management Appliance

  17. Stop Throwing Spaghetti at the Wall

    The SOC Visibility Triad signifies a massive paradigm shift in cybersecurity

    1. Photo of Tom Stitt

      Tom Stitt

      Senior Director of Security Strategy, Extrahop

  18. Bluetooth Hacks Keep Evolving, Will Your Cybersecurity Strategy?

    Is the concern about connected security in the office being overhyped?

    1. Photo of Marty Puranik

      Marty Puranik

      Founder and CEO of Atlantic.Net

  19. Security is Only as Strong as the Weakest Link

    What if the weak spot was in the foundation to which the chain was connected?

    1. Photo of Clif Triplett

      Clif Triplett

      Clif Triplett is the Executive Director for Cybersecurity & Risk Management at A.T. Kearney

  20. Keeping SOC Costs Down While Improving Security – Is it Possible?

    If the personnel just aren't there, what's a SOC to do?

    1. Photo of Yoram Salinger

      Yoram Salinger

      CEO of Perception Point

What’s hot on Infosecurity Magazine?