Infosecurity Opinions

  1. The Common Security Pitfalls of Network Modernization

    What are the most common security pitfalls that can put SD-WAN deployments at risk?

    1. Photo of Casey Corcoran

      Casey Corcoran

      CISO of OPAQ

  2. Broadening the Search for Cybersecurity Heroes

    As the cyber skills gap widens, recruiting new cyber talent is not the only solution

    1. Photo of Matthew Buskell

      Matthew Buskell

      AVP at Skillsoft

  3. Why Knowing How Your Data Behaves is the Key to Cybersecurity

    Gaining a real time insight into what’s happening with your data is critical, you need to learn what ‘good’ looks like

    1. Photo of Richard Bennett

      Richard Bennett

      Head of Advisory Services Business Solutions, EMEA, VMware

  4. Breaking the (Kill) Chain: How to Protect Your Organizations Against Cyber Threats

    Achieve a path through the cyber kill chain by understanding the anatomy of a cyber attack and strategies used by cyber-criminals.

    1. Photo of Akshay Bhargava

      Akshay Bhargava

      SVP of Products, Malwarebytes

  5. Mitigating Merger and Acquisition Risks

    Bringing together two organizations is rarely a straightforward task, and cybersecurity risks are often overlooked

    1. Photo of David Warburton

      David Warburton

      Senior Systems Engineer, Government and Defence, F5 Networks

  6. Vulnerability Scans Are a Lot Like Eating Mushrooms

    Vulnerability scanning is a security best practice dogged by compromises.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  7. The Problem with Your Password? Everything.

    When 100% of online fraud occurs after the user is authenticated, it's obvious that passwords are not doing the job.

    1. Photo of Howard Edelstein

      Howard Edelstein

      Chairman and CEO of BioCatch

  8. Facial Recognition Technology: Don’t Throw the Baby Out with the Bathwater

    The problem with facial recognition is not the technology itself but poor organizational processes, lax regulatory standards and inadequate oversight.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  9. Why Modern Security Teams can no Longer Overlook Benefits of Orchestration

    Once IT teams have orchestration technologies supporting security processes, they can make an active impact to the efficiency of employees

    1. Photo of Luis Delabarre

      Luis Delabarre

      Cybersecurity CTO at Capgemini

  10. Addressing Inherent Risks in Code Repositories

    Open source platforms enable cross-collaboration across development teams, however they also inadvertently introduce new security risks.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  11. Getting Control of Security Controls

    A focus on technology first, or an imbalanced control implementation, doesn’t necessarily lead to greater protection

    1. Photo of Douglas Ferguson

      Douglas Ferguson

      Founder and CTO, Pharos Security

  12. A Level Playing Field for Threat Intelligence

    The five priorities that every threat intelligence strategy should consider.

    1. Photo of Marc French

      Marc French

      Senior Vice President & Chief Trust Officer, Mimecast

  13. Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk

    Regardless of what version of software you are on, there may be a zero-day that exists

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  14. Does Compliance Equal Security in the Age of Data Privacy?

    Does compliance lead to security? That's the €20 million question.

    1. Photo of Felix Rosbach

      Felix Rosbach

      Product manager at comforte AG

  15. The Journey to Data Integrity

    How we can verify the authenticity of the things we see and hear, and what does this mean for data security?

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  16. Adding Tools to Tools

    How to combat insiders and external attacks with better authentication use.

    1. Photo of Julien Orsolini

      Julien Orsolini

      System Engineer EMEA, Opengear

    2. Photo of Romain Pia

      Romain Pia

      Southern Europe Manager, Opengear

  17. Questioning the Machine

    Although IT security has often favored “black box” solutions, it is worth gaining guidance on the technical components of ML/AI.

    1. Photo of John Omernik

      John Omernik

      Distinguished technologist at MapR

  18. Don’t Leave Your Doors Open - Secure Your APIs Now

    Organizations fail to effectively safeguard APIs and often see an influx of security threats as a result.

    1. Photo of Keith Casey

      Keith Casey

      API Problem Solver, Okta

  19. The Benefits of Correctly Deploying a PKI Solution

    Why and how PKI has remained a crucial part of an information security strategy.

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  20. Why You Should Implement Privacy by Design Before GDPR’s First Birthday

    How do you achieve privacy by design when the GDPR is unspecific on how to do it?

    1. Photo of Tomas Sander

      Tomas Sander

      Director of Data Privacy, Intertrust Corporation

What’s hot on Infosecurity Magazine?