Infosecurity Opinions

  1. Debunking the Discourse Around Cloud Security

    A widespread embrace of the cloud has brought benefits for collaboration and communication.

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  2. Why Third-Party Risk Assessment must be an Ongoing Process

    As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk

    1. Photo of Malcolm Taylor

      Malcolm Taylor

      Director Cyber Advisory, ITC Secure

  3. The Changing Structure of Cybersecurity Teams

    For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground

    1. Photo of Paul DeCoster

      Paul DeCoster

      Principal, Head of Practice – Risk, Legal, Compliance & Security (North America), Marlin Hawk

  4. Robots vs False Positives: AI is Future Protection for Applications and APIs

    Are the tools and processes we rely on leaving us vulnerable?

    1. Photo of Ivan Novikov

      Ivan Novikov

      CEO, Wallarm

  5. The Deal with Quantum Computing and Cryptography

    Quantum computing continues to heat up as one of the major battlefields for security

    1. Photo of Andreas Baumhof

      Andreas Baumhof

      Vice President Quantum Technologies, QuintessenceLabs

  6. Efficient Steps Toward a Successful PAM Implementation

    How to ensure a successful privileged access management implementation

    1. Photo of Cathy Hall

      Cathy Hall

      PAM Practice Lead, Sila

  7. How Forgotten Legacy Systems Could Be Your Downfall

    With end of support for Windows 7 announced for January, will we see more vulnerable networks?

  8. Is your DDos Mitigation Strategy Terabit-Proof?

    Larger and stronger DDoS attacks require a new approach to mitigate them

    1. Photo of Jeff Smith

      Jeff Smith

      Director of Security Strategy, IP & Optical Networks Group, Nokia

  9. Explaining the Breakout Success of the NIST Cybersecurity Framework

    The motivations and development that made the NIST Cybersecurity Framework a reality

    1. Joseph Perry

      Director of Research at Cybrary

  10. Are Collaboration Tools Outpacing Security?

    Collaboration tools are easy to use, but can be diametrically opposed to security by facilitating user behaviors that put organizations at risk

    1. Photo of Ramon Peypoch

      Ramon Peypoch

      SVP Products, Vera

  11. Overcoming Communication Barriers and Other Challenges

    Apart from the operational issues, it is human nature and long-held attitudes that keep the businesses from being innovative and cybersec-focused

    1. Photo of Evgenia Broshevan

      Evgenia Broshevan

      Product Manager at Hackenproof

  12. The e-state of Estonia – and its Lessons for Our Digital Future

    How Estonia's example can lead on implementable authentication

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  13. Navigating Business Email Compromise Responses, From Data Mining to Notification

    A new class of data breach vulnerability has been exposed due to hosted email

    1. Photo of Brookes Taney

      Brookes Taney

      Vice president of data breach solutions, Epiq

  14. Risk-Based Security Scores that Matter to your Business

    How can you correlate CVSS with the threats you face?

    1. Photo of John Stock

      John Stock

      Director of Product Management, Outpost24

  15. Identity-Defined Security is Critical in a Digital Transformation World

    Digital transformation requires a different approach to IAM, optimizing people, process and technology

    1. Photo of Julie Talbot-Hubbard

      Julie Talbot-Hubbard

      Global Vice President and General Manager, Digital Identity and Data Services, Optiv

  16. Don’t Overlook Geopolitics in Threat Intelligence

    Geopolitically significant events impacting nation states often precede malicious cyber activity

    1. Photo of Chris Camacho

      Chris Camacho

      Chief Strategy Officer at Flashpoint

  17. The Time to Implement a New Cybersecurity Playbook is Now

    How Q1's trends can shape 2019's playbook

    1. Photo of Rohit Dhamankar

      Rohit Dhamankar

      VP, Threat Intelligence Products at Alert Logic

  18. Boosting Corporate Security with the Intrusion Kill Chain

    How the intrusion kill chain can keep you ahead of adversaries.

    1. Photo of Tim Rains

      Tim Rains

      Cybersecurity & Compliance Leader for EMEA, AWS

  19. Security by Design – Trust in the Intelligent Cloud

    How to formulate a successful collaboration strategy and planning a robust cloud security posture

    1. Photo of William McDonald

      William McDonald

      Chief Technology Officer at StarLeaf

  20. Manufacturing Cybersecurity - the Brexit Lookout

    Will Brexit leave British industry at the mercy of cyber attackers?

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

What’s hot on Infosecurity Magazine?