Infosecurity Opinions

  1. What is the Right Response to the Extended PSD2 Deadline?

    Retailers have been granted an 18-month extension for SCA compliance, delaying implementation to March 2021

    1. Photo of Michael Reitblat

      Michael Reitblat

      Co-Founder and CEO of Forter

  2. Why Content Services Platforms Should Be ‘Need-To-Know’ Security Ready

    Need-to-know security is an essential part of protecting sensitive enterprise information

    1. Photo of Ian Raine

      Ian Raine

      Vice President of Product Management at iManage

  3. The CFO’s Perspective: Steps to Quantifying Cyber Risk

    A CFO's steps to better security decisions

    1. Bill Gadala

      Chief Financial Officer, VERA

  4. Attackers Will Get in, the Trick is to Kick Them Out ASAP

    Despite increased investments, organizations are still suffering costly breaches

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  5. PSD2 - Why You Need to Get Used to the QWAC

    QWAC standards are partly based on the CA/Browser Forum’s standard for Extended Validation certificates

    1. Photo of Roman Brunner

      Roman Brunner

      Managing Director Emerging Markets – Europe, DigiCert

  6. #GartnerSEC: How to Keep Your Job After a Cyber-Attack

    Overcoming these challenges will make an organization’s security program more defensible

    1. Photo of Paul Proctor

      Paul Proctor

      Distinguished Research VP, Gartner

  7. Why Enclaves are Taking over the Security World

    This has the potential to become the fundamental security building blocks for the enterprise

    1. Photo of Nishank  Vaish

      Nishank Vaish

      Senior Product Manager, Fortanix

  8. Crowdsourced Security is Redefining the Gig Economy, and Not in a Good Way

    Why crowdsourced security is a race to the bottom

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  9. Keeping Data Secure in the Oil and Gas Industry

    The smallest attack on this sector could result in devastating effects.

    1. Jerry Askar

      Managing Director Middle East, Levant & Africa, Certes Networks

  10. Establishing Identity in the Digital Economy

    The rise of digital and mobile usage has increased the difficulty in verifying identity

    1. Photo of Yossi Zekri

      Yossi Zekri

      President & CEO, Acuant

  11. What’s a Next Generation VPN with Zero-Trust Access?

    SDPs have a big advantage over the VPNs of old

    1. Photo of Etay Bogner

      Etay Bogner

      VP of Zero-Trust Products, Proofpoint

  12. Why Focusing on Threat Hunting May Leave you Vulnerable

    Uncovering poorly managed security solutions is a useful byproduct of threat hunting

    1. Photo of Bob Shaker

      Bob Shaker

      CSS Product Manager of Emerging Solutions, Symantec

  13. Electron Framework Vulnerabilities - Shutting the Backdoor

    The major flaw with Electron apps is they are greatly exposed due to a lack of integrity protection

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  14. Flexibility in Vulnerability Management: Why It’s Essential

    Adopting flexible, automated vulnerability management tools will be essential

    1. Photo of Jim Souders

      Jim Souders

      CEO, Adaptiva

  15. Universities Fall into the Cross Hairs of Cyber Attackers

    Cyber attacks on higher education institutions are on the rise across the globe

    1. Photo of Jens Monrad

      Jens Monrad

      Director of threat intelligence, EMEA, Mandiant

  16. Taking Data Security from Analogue to Digital

    EU regulators now encourage companies to adopt a new “digital” alternative – namely “pseudonymisation”

    1. Photo of Gary LaFever

      Gary LaFever

      CEO and General Counsel of Anonos

  17. Why the Security Industry Should Pay Attention to the Cisco Whistleblower Case

    The Cisco whistleblower case has significant implications for the security industry

    1. Photo of Claire Sylvia

      Claire Sylvia

      Partner and attorney at Phillips & Cohen LLP

  18. Complicated Compliance Made Easy

    The increasing value of privacy technology to keep tabs on your data

    1. Chris Babel

      CEO of TrustArc

  19. Software-Defined Security Governance: The Market Shift

    Every business today is truly a software business

    1. Photo of John Steven

      John Steven

      CTO, ZeroNorth

  20. The Benefits of Putting Security in Network Behavior Analytics

    Machine learning and AI are making network monitoring a powerful new tool in the fight against cyber threats

    1. Photo of Saryu Nayyar

      Saryu Nayyar

      CEO of Gurucul

What’s hot on Infosecurity Magazine?