Infosecurity Opinions

  1. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  2. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  3. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

  4. Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

    63% of SMBs believing that cloud storage providers should do more to protect their data

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  5. Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan

    Well managed data is easier to locate, utilize and update with the latest security policies

    1. Photo of Jasmit Sagoo

      Jasmit Sagoo

      Senior Director, Head of Technology UK&I, Veritas Technologies

  6. Privacy and Data Protection in Multimedia Apps

    The processing of sensitive data through multimedia apps poses significant risks to data security and privacy

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  7. Cybersecurity – It Takes an Engineer to Catch an Engineer

    How to use cyber-criminal behavior pattern knowledge to our advantage

    1. Photo of Elias Haddad

      Elias Haddad

      ICT Business Analyst

  8. The Most Influential Security Frameworks of All Time

    Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

    1. Photo of Howard Dawson

      Howard Dawson

      Tech Writer, SurfShark

  9. Safety and Security in Industry 4.0 – Are You Ready?

    A fundamental challenge remains about how advances should be secured

    1. Photo of Nigel Stanley

      Nigel Stanley

      CTO for OT and Industrial Cybersecurity, TUV Rheinland

  10. The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust

    The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

    1. Photo of Sean T. Horner

      Sean T. Horner

      Director at The Chertoff Group

  11. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

  12. Performance Anxiety and the Inability to Stop Access Threats

    The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  13. Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success

    With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  14. Why the Real Estate Industry is a Prime Target for Attackers

    Why are cyber-criminals so heavily targeting the real estate market?

    1. Photo of Ryan Heidorn

      Ryan Heidorn

      Managing partner and co-founder at Steel Root

    2. Photo of EJ Whaley

      EJ Whaley

      Solutions Engineer, GreatHorn

  15. Why Network Visibility is at the Heart of Digital Transformation

    To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution

    1. Photo of Shane Buckley

      Shane Buckley

      President and COO, Gigamon

  16. Governing Over Critical Data in the Internet of Things

    What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?

    1. Photo of Alex Willis

      Alex Willis

      Vice President, Global Technical Solutions, BlackBerry

  17. The Three Hidden Dangers of Working With Third-Party Vendors

    We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes

    1. Photo of Matt Kunkel

      Matt Kunkel

      CEO, LogicGate

  18. The Security Nightmare of Formjacking

    Staying ahead of trends and the security game, hackers have latched onto another high-return attack

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  19. #HowTo Vet AI Threat Detection Solutions for Stronger Cybersecurity

    A behavioral analytics-based approach looks at motives rather than tactics

    1. Photo of Yossi Naar

      Yossi Naar

      Chief Visionary Officer & Co-Founder, Cybereason

  20. The Role of Data in Managing Application Risk

    Risk assessment and vulnerability reporting presents the first significant data management challenge faced by appsec programs

    1. Photo of Syed Abdur Rahman

      Syed Abdur Rahman

      VP, Product Management & Marketing, Brinqa

What’s hot on Infosecurity Magazine?