Infosecurity Opinions

  1. Converged OT/IT Networks Introduce New Security Risks

    At the core of the “Industry 4.0” trend, is the convergence of operations technology (OT) and information technology (IT) networks.

    1. Photo of Reggie  Best

      Reggie Best

      President, Lumeta (a FireMon company)

  2. Dark Net Recruitment is Turning Employees into Malicious Insiders For-Hire

    A growing number of dark web recruitment pages could see your staff snared into an ongoing role.

    1. Photo of Simon Sharp

      Simon Sharp

      International vice president

  3. Implementing ISO 27001 and Avoiding Potential GDPR Consequences

    Steps businesses can take to implement ISO 27001 and avoid potential consequences from the GDPR.

    1. Photo of Matt Stacey

      Matt Stacey

      Managing Director, QMS International

  4. Moody’s Cyber Ratings Could Not Come at a Better Time – if They’re Done Right

    Moody's will add cyber risk into credit ratings, how can that be done?

    1. Photo of Ed Bellis

      Ed Bellis

      Co-founder and CTO, Kenna Security

  5. New Year. New Job. Same Threat.

    The new year means an influx of job applications. How securely are you storing these details?

    1. Photo of Simon Wiseman

      Simon Wiseman

      CTO, Deep Secure

  6. Navigating the Murky Waters of Data Policy Innovation in 2019 and Beyond

    Which barriers does data privacy face in this new year?

    1. Photo of Nick Caley

      Nick Caley

      VP of Financial Services and Regulatory, ForgeRock

  7. The Retail Industry’s Third-Party Data Breach Problem

    Some of the world’s top brands still suffer data breaches as they do not address third-party service threats.

    1. Photo of Ohad Greenshpan

      Ohad Greenshpan

      Co-founder and CTO of Namogoo

  8. Japan and the EU Create a Free Flow of Data

    How the adequacy decision between Japan and the EU will enable and affect data security.

    1. Photo of Claude-Étienne  Armingaud

      Claude-Étienne Armingaud

      Partner, K&L Gates

    2. Photo of Ignasi Guardans

      Ignasi Guardans

      Partner, K&L Gates

    3. Photo of Yuki Sako

      Yuki Sako

      Associate, K&L Gates

  9. Receiving Tons of Unexplained Out-of-office Emails?

    How you can fall victim to an email account takeover, and what the indicators are.

    1. Photo of Asaf Cidon

      Asaf Cidon

      VP Email Security, Barracuda

  10. Accessibility Trumps Security in the Battle Between Authentication Alternatives

    We have the technology to make authentication more secure, so why do we insist on outdated, tired and inferior solutions?

    1. Photo of Rob Otto

      Rob Otto

      EMEA Field CTO, Ping Identity

  11. Why Open Port Monitoring is Both an Essential and Flawed Security Control

    Checking for open ports sounds simple, but the reality is way off.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  12. Is Security The Loser As Open Banking Takes Hold?

    What security challenges does PSD2 and open banking present?

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  13. Safely Stretching Resources to Meet Industrial Cybersecurity Needs

    ICS leaders turn to specialized skillsets and advancements in secure remote access to further their industrial cybersecurity.

    1. Photo of Mark Littlejohn

      Mark Littlejohn

      Global Leader, Managed Industrial Cyber Security, Honeywell Process Solutions

  14. Suspending Privacy Shield? A Look at What's At Stake

    Market demand for Privacy Shield is soaring while being under review by the European Commission.

    1. Photo of Hilary Wandall

      Hilary Wandall

      Chief Data Governance Officer, TrustArc

  15. Would Cybersecurity Professionals Make the Best DPOs

    Could a cybersecurity professional have the skills to become a data protection officer?

    1. Photo of Jan van Vliet

      Jan van Vliet

      VP and GM EMEA

  16. Fingerprint Sensors are Not the Guarantee to Privacy

    How fingerprints are being used for authentication, but may not be flawless.

    1. Photo of Zehra Ali

      Zehra Ali

      Cybersecurity Writer

  17. How Threat Actors Abuse Legitimate Sites to Bypass Security Defenses

    Website abuse techniques offer several benefits to attackers

    1. Photo of Max  Gannon

      Max Gannon

      Intelligence Analyst, Cofense

  18. Debunking Common Misconceptions about Third-Party Risk Management

    Debunking several misconceptions about managing a third-party risk program have emerged in recent years.

    1. Photo of Stephen Boyer

      Stephen Boyer

      CTO, BitSight

  19. Managed Threat Hunting Fills a Critical Gap

    Can managed threat hunting get you in the proactive detection game?

    1. Photo of Scott Traschler

      Scott Traschler

      Director of Product Marketing, CrowdStrike

  20. Co-operate with the State: Altering Approaches to Intelligence-Sharing in Security

    A more organized, combined approach is needed to bring about collective digital security – one that pools together the resources and knowledge we have at our fingertips to assess the current threat environment.

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

What’s hot on Infosecurity Magazine?