Infosecurity Opinions

  1. Pandora’s Box Is Open – AI Won’t Get Back In

    The unfolding AI vs AI cybersecurity war

    1. Photo of Tom Ilube

      Tom Ilube

      CEO of Crossword Cybersecurity

  2. The Case for Security Instrumentation: Understanding and Measuring Cyber Risk

    So what can CIOs do to better understand and address these gaps

    1. Photo of Brian Contos

      Brian Contos

      CISO & VP, Technology Innovation, Verodin

  3. Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation

    We in IT are often guilty of conflating information with wisdom

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  4. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  5. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  6. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  7. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  8. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  9. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  10. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  11. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

  12. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  13. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  14. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  15. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  16. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  17. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

  18. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  19. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  20. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

What’s hot on Infosecurity Magazine?