Infosecurity Opinions

  1. Universities Fall into the Cross Hairs of Cyber Attackers

    Cyber attacks on higher education institutions are on the rise across the globe

    1. Photo of Jens Monrad

      Jens Monrad

      Director of threat intelligence, EMEA, Mandiant

  2. Taking Data Security from Analogue to Digital

    EU regulators now encourage companies to adopt a new “digital” alternative – namely “pseudonymisation”

    1. Photo of Gary LaFever

      Gary LaFever

      CEO and General Counsel of Anonos

  3. Why the Security Industry Should Pay Attention to the Cisco Whistleblower Case

    The Cisco whistleblower case has significant implications for the security industry

    1. Photo of Claire Sylvia

      Claire Sylvia

      Partner and attorney at Phillips & Cohen LLP

  4. Complicated Compliance Made Easy

    The increasing value of privacy technology to keep tabs on your data

    1. Chris Babel

      CEO of TrustArc

  5. Software-Defined Security Governance: The Market Shift

    Every business today is truly a software business

    1. Photo of John Steven

      John Steven

      CTO, ZeroNorth

  6. The Benefits of Putting Security in Network Behavior Analytics

    Machine learning and AI are making network monitoring a powerful new tool in the fight against cyber threats

    1. Photo of Saryu Nayyar

      Saryu Nayyar

      CEO of Gurucul

  7. A Trio of Approaches to Enhance Your NOC/SOC Collaboration

    The lines between the NOC and SOC are breaking down

    1. Photo of Chris Adams

      Chris Adams

      President and CEO at Park Place Technologies

  8. #HowTo Gain Visibility of Third Parties

    Organizations should look to bring third parties in using tools that isolate or broker the connection

    1. Photo of Karl Lankford

      Karl Lankford

      Director of Solutions Engineering, Beyond Trust

  9. Removing Fear by Moving to Risk-Based Security Programs

    Security teams do a poor job of prioritizing risk and sometimes do not even understand risk management

    1. Photo of Brian Golumbeck

      Brian Golumbeck

      Practice Director, Risk Management and Transformation, Optiv

  10. Counting on Quantitative Cyber Risk

    The perceived importance of cyber risk has almost tripled in five years, but the expertise and technology has not kept pace

    1. Photo of Paul Stokes

      Paul Stokes

      Co-founder and CEO of Prevalent AI and the Managed Security Forum

  11. Defining KPIs for ISO 27001

    Companies need strong cases for updating their equipment or acquiring new technology

    1. Photo of Rhand Leal

      Rhand Leal

      ISO 27001 Expert

  12. Why Managed Service Providers Need to Help with Passwords

    Bad password habits directly pose a threat to the defense of networks, devices and users

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  13. Why IT Security Hygiene is so Crucial for Financial Services Firms

    Many IT and security leaders are juggling business priorities and their own internal security requirements

    1. Photo of Chris Hodson

      Chris Hodson

      CISO, Tanium

  14. Is Shadow IT Really the Perilous Threat It's Made Out to Be?

    It's difficult for administrators to secure what they don't know exists

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  15. Gearing up for an AI Revolution in Access Modelling

    Think of a role as a label that we attach to an identifiable access pattern

    1. Photo of Mo Badawy

      Mo Badawy

      Principal Data Scientist, SailPoint

    2. Photo of Jostine Ho

      Jostine Ho

      Senior Data Scientist, SailPoint

  16. My Voice is My Ultimate Password

    How Biometrics Can Keep Hackers At Bay

    1. Photo of Piergiorgio Vittori

      Piergiorgio Vittori

      Global Development Director at Spitch

  17. Why Modern Identity Verification is Crucial in Today’s Threat Landscape

    Multiple digital identity checks for remote verification will help increase pass rates

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  18. Staying on the Cutting Edge of Cybersecurity

    With edge computing, the application and its data, are distributed across multiple locations

    1. Photo of Andrew Bargery

      Andrew Bargery

      Solutions Architect, F5 Networks

  19. Next Generation Cyber: Malware-Free Attacks

    The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  20. System Hardening, and Why it’s Harder Than it Looks

    The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

What’s hot on Infosecurity Magazine?