Infosecurity Opinions

  1. Excessive Access is a Threat to Mainframe Security – Is Your Company at Risk?

    Excessive access is usually uneccessary, how can you better manage it?

    1. Photo of Ray Overby

      Ray Overby

      Founder and President, Key Resources

  2. Keeping the .UK Internet Secure For All

    2019 will see third-level. UK domains face the decision of taking up the second-level equivalent

    1. Photo of Oli Hope

      Oli Hope

      Director of Registry Services, Nominet

  3. What is Wrong with IoT Security Today?

    Many organizations are using Public Key Infrastructure (PKI), but doing so without thinking beyond the next couple of years

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  4. HIPAA Compliance in the Cloud: Who’s Responsible?

    Cloud compliance is important, although it does not have to be complicated

    1. Photo of David Hold

      David Hold

      Senior Product Marketing Manager, j2 Cloud Services

  5. Forgotten, But Not Gone: The Security Risk of Legacy Apps

    Legacy apps are a part of any company’s growth story, whether an organization grows organically or through M&A

    1. Tim Buntel

      VP of Application Security, Threat Stack

  6. A US State of Readiness?

    Does the US need its own version of GDPR?

    1. Photo of Paul Sonntag

      Paul Sonntag

      Director of GDPR and privacy, Coalfire

  7. Can Your Data Be Held Hostage?

    How do you know if your data is held hostage, or altered without your knowledge?

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  8. The Insider Threat - the Top Security Issue of 2019?

    The insider threat should be addressed in a systematic manner, with policies applied both internally and to your assessments of outside services.

    1. Photo of Marty Puranik

      Marty Puranik

      Founder and CEO of Atlantic.Net

  9. How Modern Web Applications Changed the Way Enterprises Should Handle Security

    APIs have proliferated across application environments to allow access to a much broader range of users

    1. Photo of Roey Eliyahu

      Roey Eliyahu

      CEO and Co-Founder, Salt Security

  10. The Benefits to Hiring a Diverse Cyber Team

    A rich pool of experience and backgrounds encourages diversity of thought and new perspectives

    1. Photo of Paul Jaynes

      Paul Jaynes

      Vice President, SOC, Pocydon

  11. Are Shadow Cloud Services Undermining Your Security Efforts?

    Most enterprises have dozens of “shadow cloud” applications in use that introduce risk because they weren’t planned

    1. Photo of Bob Post

      Bob Post

      Managing principal of the Cyber Risk Advisory practice, Coalfire

  12. Most Businesses Overlook One Common Mainframe Security Vulnerability

    Functions provided by mainframes are some of the most visible and customer-centric aspects of your technology

    1. Photo of Ray Overby

      Ray Overby

      Founder and President, Key Resources

  13. Zero to Hero: Securing Your Business with Zero Trust

    How a business-driven approach addresses the challenges around the zero trust model

    1. Photo of Jeffrey Starr

      Jeffrey Starr

      CMO, AlgoSec

  14. How Blockchain Addresses Public Key Infrastructure Shortcomings

    How Blockchain could save or replace PKI

    1. Photo of Alex Momot

      Alex Momot

      CEO, Remme

  15. Europe’s Open Source Bug Bounty: A Wrong Start

    Is Europe's bug bounty for open source projects a step forward or back?

    1. Photo of Gabriel Avner

      Gabriel Avner

      Senior Writer, Mend.io

  16. Changing Threat Landscape Demands a New Paradigm of Cybersecurity

    The threat landscape now includes bots, sophisticated attacks and vulnerable employees. Are you keeping up?

    1. Photo of Tom  Leighton

      Tom Leighton

      CEO and Co-Founder, Akamai

  17. Super Systemic IoT Issues

    Recognizing that they need to implement better security, IoT manufacturers are increasingly turning to third party providers

    1. Photo of Ken Munro

      Ken Munro

      Partner, Pen Test Partners

  18. The Common Security Pitfalls of Network Modernization

    What are the most common security pitfalls that can put SD-WAN deployments at risk?

    1. Photo of Casey Corcoran

      Casey Corcoran

      CISO of OPAQ

  19. Broadening the Search for Cybersecurity Heroes

    As the cyber skills gap widens, recruiting new cyber talent is not the only solution

    1. Photo of Matthew Buskell

      Matthew Buskell

      AVP at Skillsoft

  20. Why Knowing How Your Data Behaves is the Key to Cybersecurity

    Gaining a real time insight into what’s happening with your data is critical, you need to learn what ‘good’ looks like

    1. Photo of Richard Bennett

      Richard Bennett

      Head of Advisory Services Business Solutions, EMEA, VMware

What’s hot on Infosecurity Magazine?