Infosecurity Opinions

  1. Avoiding Security Certificate Missteps

    Digital certificates and signatures offer a foundational layer of trust to reinforce corporate IT security strategy

    1. Photo of Chris Hickman

      Chris Hickman

      Chief Security Officer, Keyfactor

  2. Stop the Noise, Time to Rationalize Cybersecurity

    Security managers moving away from buying solutions and focus on consolidation and simplification of security stacks

    1. Photo of David Atkinson

      David Atkinson

      Founder and CEO of Senseon

  3. The Rise of Stegware

    The rise of “Stegware": more evidence threats are getting stealthier and the need for visibility is rising

    1. Photo of Barbara Kay

      Barbara Kay

      Senior Director of Security, Extrahop

  4. API Security Vulnerabilities: A Crack in the Foundation of Digital Business

    A Digital Business Foundation Built on APIs

    1. Photo of Derick Townsend

      Derick Townsend

      VP, Product Marketing, Ping Identity

  5. Preparing for the California Consumer Privacy Act: Avoid the Landmines & Learn from GDPR

    Looking forward to the CCPA, and what impact GDPR has had upon it

    1. Photo of Robert Prigge

      Robert Prigge

      President, Jumio

  6. Securing a Country’s Crucial Networks

    Safeguarding the public sector from cyber-attacks is a key responsibility of our country’s government

    1. Photo of Andrew Bushby

      Andrew Bushby

      UK director, Fidelis Cybersecurity

  7. Effective Risk Analysis in Cybersecurity, Operational Technology and the Supply Chain

    Whether in cybersecurity, operational technology, or supply chain domains, problems emerge when you assess and manage risk with quantitative analysis.

    1. Photo of Jim Hietala

      Jim Hietala

      VP Security, The Open Group

  8. Leveraging the Biometrics Ecosystem to Improve Cybersecurity

    To properly leverage biometrics, you should understand elements that make it a powerful tool

    1. Photo of Bojan Simic

      Bojan Simic

      Cofounder and CTO, HYPR

  9. Failing to Accept Human Nature Makes for Shoddy Cybersecurity

    In the worst instances, unwittingly falling victim to a piece of malware could cost you your job

    1. Photo of Henry  Harrison

      Henry Harrison

      CTO and co-founder of Garrison

  10. The Value of Predictive Email Security

    Threat prediction can help businesses use data to prepare for what the next attack will look like

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  11. Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do

    Achieving risk management goals will not improve your risk posture

    1. Photo of Shay Colson

      Shay Colson

      Director at Duff & Phelps, CyberClarity360

  12. Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet

    By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm

    1. Photo of Max Heinemeyer

      Max Heinemeyer

      Director of Threat Hunting, Darktrace

  13. Before Blaming Hackers, Check Your Configurations

    Default SaaS settings often weigh easy access and usability over better security.

    1. Photo of Michael Hiskey

      Michael Hiskey

      Chief Marketing Officer, Avanan

  14. Tactics to Go Fully Secure in the Cloud

    The best ways to beef up cloud security posture and set yourself up for success

    1. Tim Reilly

      COO, Zettaset

  15. Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations

    Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  16. Actions After you Find the Network Anomaly

    Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  17. Months After the US Government Shutdown, Cybersecurity is Still Suffering

    Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

    1. Photo of Eric Poynton

      Eric Poynton

      Lead Network Threat Hunter at Awake Security

  18. An Incident Response Walkthrough - Why is Process so Important?

    How unusual activity on a laptop turned into a lesson on incident response

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

    2. Photo of Lauren Rudman

      Lauren Rudman

      Junior security researcher, SecureData Labs

  19. Reduce Security Complexity for Cloud Architectures

    Threats that target public clouds require a different type of insight and action

    1. Photo of Dan Hubbard

      Dan Hubbard

      Chief Product Officer at Lacework

  20. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

What’s hot on Infosecurity Magazine?