Infosecurity Opinions

  1. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

  2. The Threat Hunting Architecture

    Threat hunting is the proactive process of looking for signs of malicious activity

    1. Photo of Rohit Sadgune

      Rohit Sadgune

      Senior Security Solution Engineer at Securonix

  3. Supply Chain Attacks: When Things Go Wrong

    How supply chain attacks have leveraged the weakest links in security

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  4. Fast and Furious Phishing Attacks – The Race Against Time Matters

    The race against time matters when defending against phishing attacks

    1. Photo of Atif Mushtaq

      Atif Mushtaq

      CEO of SlashNext

  5. Double Edged Sword of Secure Traffic

    The positive and negative aspects of encrypted traffic

    1. Photo of James  Preston

      James Preston

      Security Architect, ANSecurity

  6. Homomorphic Encryption for Secure Elastic Data Stream Processing

    How Fully Homomorphic Encryption can aid your cloud security

    1. Photo of Miyuru Dayarathna

      Miyuru Dayarathna

      Senior Technical Lead, WS02

  7. Debunking the Discourse Around Cloud Security

    A widespread embrace of the cloud has brought benefits for collaboration and communication.

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  8. Why Third-Party Risk Assessment must be an Ongoing Process

    As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk

    1. Photo of Malcolm Taylor

      Malcolm Taylor

      Director Cyber Advisory, ITC Secure

  9. The Changing Structure of Cybersecurity Teams

    For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground

    1. Photo of Paul DeCoster

      Paul DeCoster

      Principal, Head of Practice – Risk, Legal, Compliance & Security (North America), Marlin Hawk

  10. Robots vs False Positives: AI is Future Protection for Applications and APIs

    Are the tools and processes we rely on leaving us vulnerable?

    1. Photo of Ivan Novikov

      Ivan Novikov

      CEO, Wallarm

  11. The Deal with Quantum Computing and Cryptography

    Quantum computing continues to heat up as one of the major battlefields for security

    1. Photo of Andreas Baumhof

      Andreas Baumhof

      Vice President Quantum Technologies, QuintessenceLabs

  12. Efficient Steps Toward a Successful PAM Implementation

    How to ensure a successful privileged access management implementation

    1. Photo of Cathy Hall

      Cathy Hall

      PAM Practice Lead, Sila

  13. How Forgotten Legacy Systems Could Be Your Downfall

    With end of support for Windows 7 announced for January, will we see more vulnerable networks?

  14. Is your DDos Mitigation Strategy Terabit-Proof?

    Larger and stronger DDoS attacks require a new approach to mitigate them

    1. Photo of Jeff Smith

      Jeff Smith

      Director of Security Strategy, IP & Optical Networks Group, Nokia

  15. Explaining the Breakout Success of the NIST Cybersecurity Framework

    The motivations and development that made the NIST Cybersecurity Framework a reality

    1. Joseph Perry

      Director of Research at Cybrary

  16. Are Collaboration Tools Outpacing Security?

    Collaboration tools are easy to use, but can be diametrically opposed to security by facilitating user behaviors that put organizations at risk

    1. Photo of Ramon Peypoch

      Ramon Peypoch

      SVP Products, Vera

  17. Overcoming Communication Barriers and Other Challenges

    Apart from the operational issues, it is human nature and long-held attitudes that keep the businesses from being innovative and cybersec-focused

    1. Photo of Evgenia Broshevan

      Evgenia Broshevan

      Product Manager at Hackenproof

  18. The e-state of Estonia – and its Lessons for Our Digital Future

    How Estonia's example can lead on implementable authentication

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  19. Navigating Business Email Compromise Responses, From Data Mining to Notification

    A new class of data breach vulnerability has been exposed due to hosted email

    1. Photo of Brookes Taney

      Brookes Taney

      Vice president of data breach solutions, Epiq

  20. Risk-Based Security Scores that Matter to your Business

    How can you correlate CVSS with the threats you face?

    1. Photo of John Stock

      John Stock

      Director of Product Management, Outpost24

What’s hot on Infosecurity Magazine?