Infosecurity Opinions

  1. Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do

    Achieving risk management goals will not improve your risk posture

    1. Photo of Shay Colson

      Shay Colson

      Director at Duff & Phelps, CyberClarity360

  2. Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet

    By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm

    1. Photo of Max Heinemeyer

      Max Heinemeyer

      Director of Threat Hunting, Darktrace

  3. Before Blaming Hackers, Check Your Configurations

    Default SaaS settings often weigh easy access and usability over better security.

    1. Photo of Michael Hiskey

      Michael Hiskey

      Chief Marketing Officer, Avanan

  4. Tactics to Go Fully Secure in the Cloud

    The best ways to beef up cloud security posture and set yourself up for success

    1. Tim Reilly

      COO, Zettaset

  5. Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations

    Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  6. Actions After you Find the Network Anomaly

    Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  7. Months After the US Government Shutdown, Cybersecurity is Still Suffering

    Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

    1. Photo of Eric Poynton

      Eric Poynton

      Lead Network Threat Hunter at Awake Security

  8. An Incident Response Walkthrough - Why is Process so Important?

    How unusual activity on a laptop turned into a lesson on incident response

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

    2. Photo of Lauren Rudman

      Lauren Rudman

      Junior security researcher, SecureData Labs

  9. Reduce Security Complexity for Cloud Architectures

    Threats that target public clouds require a different type of insight and action

    1. Photo of Dan Hubbard

      Dan Hubbard

      Chief Product Officer at Lacework

  10. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

  11. Illuminating the Dark Web

    Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

    1. Photo of Gene Yoo

      Gene Yoo

      CEO, Resecurity

  12. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  13. Open Source Tools Provide Low-cost Development Options for Cyber-criminals

    Tools openly available to researchers are also available to those with more malicious intent

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  14. Cyber Attackers and IT Admins: Twins Separated at Birth

    The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

    1. Photo of Tal Zamir

      Tal Zamir

      Founder, CTO & Board Member, Hysolate

  15. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

  16. The Threat Hunting Architecture

    Threat hunting is the proactive process of looking for signs of malicious activity

    1. Photo of Rohit Sadgune

      Rohit Sadgune

      Senior Security Solution Engineer at Securonix

  17. Supply Chain Attacks: When Things Go Wrong

    How supply chain attacks have leveraged the weakest links in security

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  18. Fast and Furious Phishing Attacks – The Race Against Time Matters

    The race against time matters when defending against phishing attacks

    1. Photo of Atif Mushtaq

      Atif Mushtaq

      CEO of SlashNext

  19. Double Edged Sword of Secure Traffic

    The positive and negative aspects of encrypted traffic

    1. Photo of James  Preston

      James Preston

      Security Architect, ANSecurity

  20. Homomorphic Encryption for Secure Elastic Data Stream Processing

    How Fully Homomorphic Encryption can aid your cloud security

    1. Photo of Miyuru Dayarathna

      Miyuru Dayarathna

      Senior Technical Lead, WS02

What’s hot on Infosecurity Magazine?