Infosecurity Opinions

  1. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  2. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  3. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

  4. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  5. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  6. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

  7. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  8. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  9. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

  10. Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

    63% of SMBs believing that cloud storage providers should do more to protect their data

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  11. Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan

    Well managed data is easier to locate, utilize and update with the latest security policies

    1. Photo of Jasmit Sagoo

      Jasmit Sagoo

      Senior Director, Head of Technology UK&I, Veritas Technologies

  12. Privacy and Data Protection in Multimedia Apps

    The processing of sensitive data through multimedia apps poses significant risks to data security and privacy

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  13. Cybersecurity – It Takes an Engineer to Catch an Engineer

    How to use cyber-criminal behavior pattern knowledge to our advantage

    1. Photo of Elias Haddad

      Elias Haddad

      ICT Business Analyst

  14. The Most Influential Security Frameworks of All Time

    Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

    1. Photo of Howard Dawson

      Howard Dawson

      Tech Writer, SurfShark

  15. Safety and Security in Industry 4.0 – Are You Ready?

    A fundamental challenge remains about how advances should be secured

    1. Photo of Nigel Stanley

      Nigel Stanley

      CTO for OT and Industrial Cybersecurity, TUV Rheinland

  16. The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust

    The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

    1. Photo of Sean T. Horner

      Sean T. Horner

      Director at The Chertoff Group

  17. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

  18. Performance Anxiety and the Inability to Stop Access Threats

    The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  19. Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success

    With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  20. Why the Real Estate Industry is a Prime Target for Attackers

    Why are cyber-criminals so heavily targeting the real estate market?

    1. Photo of Ryan Heidorn

      Ryan Heidorn

      Managing partner and co-founder at Steel Root

    2. Photo of EJ Whaley

      EJ Whaley

      Solutions Engineer, GreatHorn

What’s hot on Infosecurity Magazine?