Infosecurity Opinions

  1. Zero to Hero: Securing Your Business with Zero Trust

    How a business-driven approach addresses the challenges around the zero trust model

    1. Photo of Jeffrey Starr

      Jeffrey Starr

      CMO, AlgoSec

  2. How Blockchain Addresses Public Key Infrastructure Shortcomings

    How Blockchain could save or replace PKI

    1. Photo of Alex Momot

      Alex Momot

      CEO, Remme

  3. Europe’s Open Source Bug Bounty: A Wrong Start

    Is Europe's bug bounty for open source projects a step forward or back?

    1. Photo of Gabriel Avner

      Gabriel Avner

      Senior Writer, Mend.io

  4. Changing Threat Landscape Demands a New Paradigm of Cybersecurity

    The threat landscape now includes bots, sophisticated attacks and vulnerable employees. Are you keeping up?

    1. Photo of Tom  Leighton

      Tom Leighton

      CEO and Co-Founder, Akamai

  5. Super Systemic IoT Issues

    Recognizing that they need to implement better security, IoT manufacturers are increasingly turning to third party providers

    1. Photo of Ken Munro

      Ken Munro

      Partner, Pen Test Partners

  6. The Common Security Pitfalls of Network Modernization

    What are the most common security pitfalls that can put SD-WAN deployments at risk?

    1. Photo of Casey Corcoran

      Casey Corcoran

      CISO of OPAQ

  7. Broadening the Search for Cybersecurity Heroes

    As the cyber skills gap widens, recruiting new cyber talent is not the only solution

    1. Photo of Matthew Buskell

      Matthew Buskell

      AVP at Skillsoft

  8. Why Knowing How Your Data Behaves is the Key to Cybersecurity

    Gaining a real time insight into what’s happening with your data is critical, you need to learn what ‘good’ looks like

    1. Photo of Richard Bennett

      Richard Bennett

      Head of Advisory Services Business Solutions, EMEA, VMware

  9. Breaking the (Kill) Chain: How to Protect Your Organizations Against Cyber Threats

    Achieve a path through the cyber kill chain by understanding the anatomy of a cyber attack and strategies used by cyber-criminals.

    1. Photo of Akshay Bhargava

      Akshay Bhargava

      SVP of Products, Malwarebytes

  10. Mitigating Merger and Acquisition Risks

    Bringing together two organizations is rarely a straightforward task, and cybersecurity risks are often overlooked

    1. Photo of David Warburton

      David Warburton

      Senior Systems Engineer, Government and Defence, F5 Networks

  11. Vulnerability Scans Are a Lot Like Eating Mushrooms

    Vulnerability scanning is a security best practice dogged by compromises.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  12. The Problem with Your Password? Everything.

    When 100% of online fraud occurs after the user is authenticated, it's obvious that passwords are not doing the job.

    1. Photo of Howard Edelstein

      Howard Edelstein

      Chairman and CEO of BioCatch

  13. Facial Recognition Technology: Don’t Throw the Baby Out with the Bathwater

    The problem with facial recognition is not the technology itself but poor organizational processes, lax regulatory standards and inadequate oversight.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  14. Why Modern Security Teams can no Longer Overlook Benefits of Orchestration

    Once IT teams have orchestration technologies supporting security processes, they can make an active impact to the efficiency of employees

    1. Photo of Luis Delabarre

      Luis Delabarre

      Cybersecurity CTO at Capgemini

  15. Addressing Inherent Risks in Code Repositories

    Open source platforms enable cross-collaboration across development teams, however they also inadvertently introduce new security risks.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  16. Getting Control of Security Controls

    A focus on technology first, or an imbalanced control implementation, doesn’t necessarily lead to greater protection

    1. Photo of Douglas Ferguson

      Douglas Ferguson

      Founder and CTO, Pharos Security

  17. A Level Playing Field for Threat Intelligence

    The five priorities that every threat intelligence strategy should consider.

    1. Photo of Marc French

      Marc French

      Senior Vice President & Chief Trust Officer, Mimecast

  18. Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk

    Regardless of what version of software you are on, there may be a zero-day that exists

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  19. Does Compliance Equal Security in the Age of Data Privacy?

    Does compliance lead to security? That's the €20 million question.

    1. Photo of Felix Rosbach

      Felix Rosbach

      Product manager at comforte AG

  20. The Journey to Data Integrity

    How we can verify the authenticity of the things we see and hear, and what does this mean for data security?

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

What’s hot on Infosecurity Magazine?