Infosecurity Opinions

  1. Real ID Driver License Push Could Mean Real Headaches for US State Agencies

    Real ID is one of the biggest data-gathering initiatives to take place recently

    1. Photo of Brian Vecci

      Brian Vecci

      Field CTO, Varonis

  2. Software Security Witching Hour is Upon us

    Which vulnerabilities are lurking in the shadows?

    1. Photo of Meera Rao

      Meera Rao

      Senior Principal Consultant, Synopsys

  3. Effective Encryption Protects Data When it's Most Vulnerable

    Remember that data exists in essentially three states: at-rest, in-motion, and in-use

    1. Photo of Jerry Ray

      Jerry Ray

      COO, SecureAge

  4. How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?

    More and more enterprises are relying on third-party service providers

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  5. #HowTo Avoid Common Mistakes in Vulnerability Management

    A successful vulnerability management program is all about the reduction of business risk

    1. Photo of Brian Carey

      Brian Carey

      Consulting services manager, Rapid7

  6. The Hunt for Effective Machine Learning in Security

    The vast majority of today’s breaches root back to a failure of detection

    1. Photo of Kumar Saurabh

      Kumar Saurabh

      CEO and co-founder of LogicHub

  7. Curbing Insider Insecurity

    Cyber-criminals often weaponize ignorance in their attacks

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  8. Cloud Migration Makes an Old Data Security Problem New Again

    The current push toward digital transformation can only exacerbate the problem

    1. Photo of Gordon Smith

      Gordon Smith

      President and CEO of Sagent

  9. Fighting Fraud: Connecting the Dots with Data

    Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor

    1. Photo of Carol  Hamilton

      Carol Hamilton

      Regional Director of Compliance and Fraud Solutions – EMEA, GBG

  10. SOC 1, 2, & 3 Audit Reports, and Why You Need One

    A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work

    1. Photo of Max Aulakh

      Max Aulakh

      President, Ignyte Assurance Platform

  11. Managing Non-Security Incidents with Security Tools and Policies

    What happens when an incident isn’t security related?

    1. Photo of Matt Petrosky

      Matt Petrosky

      VP of Customer Experience, GreatHorn

  12. Equifax and Capital One: What Should We Learn?

    Both were possible because of basic holes in the companies’ cyber hygiene practices

    1. Photo of Richard Melick

      Richard Melick

      Senior Technical Product Manager at Automox

  13. How Secure Is Behavioral Biometrics?

    Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics

    1. Photo of David Smith

      David Smith

      Independent Consultant

  14. Defending in the Age of Advanced Insiders

    Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack

    1. Photo of Brian Vecci

      Brian Vecci

      Field CTO, Varonis

  15. Application Security Report: Urgent Need for Remediation

    Remediation rates for security flaws have been gradually declining

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  16. We’ve Been Breached! What Do You Want From Us?

    While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

    1. Photo of Michael Bruemmer

      Michael Bruemmer

      Vice President, Experian Data Breach Resolution and Consumer Protection

  17. #HowTo Develop a Detection and Response Strategy for Email Phishing

    You need to get your employees on board to help prevent phishing

    1. Photo of Segun Onibalusi

      Segun Onibalusi

      Digital Marketing Consultant

  18. Why Understanding the User Experience is Essential to Good Security

    Security and usability have traditionally been opposing concepts.

    1. Photo of Sally Carson

      Sally Carson

      Head of Product Design and User Experience at Duo Security, now part of Cisco

  19. Bots x Humans: a Solution is Needed

    Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

    1. Photo of Steven Puddephatt

      Steven Puddephatt

      Technical Architect at GlobalDots

  20. Your Employees are Taking Your Data

    Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

    1. Photo of Richard Agnew

      Richard Agnew

      VP UK, I & Northern Europe, Code42

What’s hot on Infosecurity Magazine?