Infosecurity Opinions

  1. Months After the US Government Shutdown, Cybersecurity is Still Suffering

    Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

    1. Photo of Eric Poynton

      Eric Poynton

      Lead Network Threat Hunter at Awake Security

  2. An Incident Response Walkthrough - Why is Process so Important?

    How unusual activity on a laptop turned into a lesson on incident response

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

    2. Photo of Lauren Rudman

      Lauren Rudman

      Junior security researcher, SecureData Labs

  3. Reduce Security Complexity for Cloud Architectures

    Threats that target public clouds require a different type of insight and action

    1. Photo of Dan Hubbard

      Dan Hubbard

      Chief Product Officer at Lacework

  4. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

  5. Illuminating the Dark Web

    Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

    1. Photo of Gene Yoo

      Gene Yoo

      CEO, Resecurity

  6. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  7. Open Source Tools Provide Low-cost Development Options for Cyber-criminals

    Tools openly available to researchers are also available to those with more malicious intent

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  8. Cyber Attackers and IT Admins: Twins Separated at Birth

    The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

    1. Photo of Tal Zamir

      Tal Zamir

      Founder, CTO & Board Member, Hysolate

  9. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

  10. The Threat Hunting Architecture

    Threat hunting is the proactive process of looking for signs of malicious activity

    1. Photo of Rohit Sadgune

      Rohit Sadgune

      Senior Security Solution Engineer at Securonix

  11. Supply Chain Attacks: When Things Go Wrong

    How supply chain attacks have leveraged the weakest links in security

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  12. Fast and Furious Phishing Attacks – The Race Against Time Matters

    The race against time matters when defending against phishing attacks

    1. Photo of Atif Mushtaq

      Atif Mushtaq

      CEO of SlashNext

  13. Double Edged Sword of Secure Traffic

    The positive and negative aspects of encrypted traffic

    1. Photo of James  Preston

      James Preston

      Security Architect, ANSecurity

  14. Homomorphic Encryption for Secure Elastic Data Stream Processing

    How Fully Homomorphic Encryption can aid your cloud security

    1. Photo of Miyuru Dayarathna

      Miyuru Dayarathna

      Senior Technical Lead, WS02

  15. Debunking the Discourse Around Cloud Security

    A widespread embrace of the cloud has brought benefits for collaboration and communication.

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  16. Why Third-Party Risk Assessment must be an Ongoing Process

    As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk

    1. Photo of Malcolm Taylor

      Malcolm Taylor

      Director Cyber Advisory, ITC Secure

  17. The Changing Structure of Cybersecurity Teams

    For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground

    1. Photo of Paul DeCoster

      Paul DeCoster

      Principal, Head of Practice – Risk, Legal, Compliance & Security (North America), Marlin Hawk

  18. Robots vs False Positives: AI is Future Protection for Applications and APIs

    Are the tools and processes we rely on leaving us vulnerable?

    1. Photo of Ivan Novikov

      Ivan Novikov

      CEO, Wallarm

  19. The Deal with Quantum Computing and Cryptography

    Quantum computing continues to heat up as one of the major battlefields for security

    1. Photo of Andreas Baumhof

      Andreas Baumhof

      Vice President Quantum Technologies, QuintessenceLabs

  20. Efficient Steps Toward a Successful PAM Implementation

    How to ensure a successful privileged access management implementation

    1. Photo of Cathy Hall

      Cathy Hall

      PAM Practice Lead, Sila

What’s hot on Infosecurity Magazine?