Infosecurity Opinions

  1. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

  2. Performance Anxiety and the Inability to Stop Access Threats

    The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  3. Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success

    With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  4. Why the Real Estate Industry is a Prime Target for Attackers

    Why are cyber-criminals so heavily targeting the real estate market?

    1. Photo of Ryan Heidorn

      Ryan Heidorn

      Managing partner and co-founder at Steel Root

    2. Photo of EJ Whaley

      EJ Whaley

      Solutions Engineer, GreatHorn

  5. Why Network Visibility is at the Heart of Digital Transformation

    To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution

    1. Photo of Shane Buckley

      Shane Buckley

      President and COO, Gigamon

  6. Governing Over Critical Data in the Internet of Things

    What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?

    1. Photo of Alex Willis

      Alex Willis

      Vice President, Global Technical Solutions, BlackBerry

  7. The Three Hidden Dangers of Working With Third-Party Vendors

    We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes

    1. Photo of Matt Kunkel

      Matt Kunkel

      CEO, LogicGate

  8. The Security Nightmare of Formjacking

    Staying ahead of trends and the security game, hackers have latched onto another high-return attack

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  9. #HowTo Vet AI Threat Detection Solutions for Stronger Cybersecurity

    A behavioral analytics-based approach looks at motives rather than tactics

    1. Photo of Yossi Naar

      Yossi Naar

      Chief Visionary Officer & Co-Founder, Cybereason

  10. The Role of Data in Managing Application Risk

    Risk assessment and vulnerability reporting presents the first significant data management challenge faced by appsec programs

    1. Photo of Syed Abdur Rahman

      Syed Abdur Rahman

      VP, Product Management & Marketing, Brinqa

  11. The Five Pillars of Actionable Cloud Security

    Designing and deploying an actionable cloud security framework that follows industry best practices (in sequence) gives companies the best chance for success.

    1. Photo of Tim Jefferson

      Tim Jefferson

      VP of public cloud at Barracuda Networks

  12. #HowTo Enable Effective Security Awareness Training

    Steps to take to enable efficient security awareness

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  13. Protecting Service Revenue from Hackers: Cybersecurity for Connected Maintenance Apps

    Modern maintenance apps provide on-site history, diagnostics, performance measurement and tunability of systems

    1. Photo of Mark Hearn

      Mark Hearn

      Director of IoT Security and Business Development, Irdeto

  14. Apps: Gateway to Your Private Data

    For companies that store personal data, there is a hefty burden of responsibility.

    1. Photo of Terry Ray

      Terry Ray

      SVP, Imperva

  15. What Should Frighten us about AI-Based Malware?

    AI machine learning (ML) security powered by algorithms was intended to defeat cyber doom and gloom

    1. Photo of Steve Rymell

      Steve Rymell

      Head of Technology, Airbus CyberSecurity

  16. The Brexit Threat: Chaos, Confusion and Con Men

    Confusion brought about by Brexit is opening up more opportunities for cyber-criminals

    1. Photo of Guy Bunker

      Guy Bunker

      SVP of Products, Clearswift

  17. Vendors Need to Stop Fear Selling, it’s Damaging the Whole Industry

    FUD selling is frustrating, unhelpful and damaging

    1. Photo of Aidan Simister

      Aidan Simister

      CEO, Lepide

  18. Cybersecurity: Lessons from Israel

    Israel’s current set up continues to create a constant stream of talented cybersecurity operatives

    1. Photo of Andrzej Kawalec

      Andrzej Kawalec

      European Director of Strategy & Technology, Optiv

  19. Why a Flash-To-Cloud Approach Will Be the Last Protection Standing in the IoT

    An innovative approach to IoT security is to protect the device’s flash, even from the processor and the software that is running on it

    1. Photo of Yoni Kahana

      Yoni Kahana

      VP, Customers, NanoLock Security

  20. Password Spraying Fells Citrix. Are We Next?

    The Citrix breach could turn out to be one of the most important in recent years

    1. Photo of Amit Rahav

      Amit Rahav

      VP of Marketing and Customer Success for Secret Double Octopus

What’s hot on Infosecurity Magazine?