Infosecurity Opinions

  1. Adding Tools to Tools

    How to combat insiders and external attacks with better authentication use.

    1. Photo of Julien Orsolini

      Julien Orsolini

      System Engineer EMEA, Opengear

    2. Photo of Romain Pia

      Romain Pia

      Southern Europe Manager, Opengear

  2. Questioning the Machine

    Although IT security has often favored “black box” solutions, it is worth gaining guidance on the technical components of ML/AI.

    1. Photo of John Omernik

      John Omernik

      Distinguished technologist at MapR

  3. Don’t Leave Your Doors Open - Secure Your APIs Now

    Organizations fail to effectively safeguard APIs and often see an influx of security threats as a result.

    1. Photo of Keith Casey

      Keith Casey

      API Problem Solver, Okta

  4. The Benefits of Correctly Deploying a PKI Solution

    Why and how PKI has remained a crucial part of an information security strategy.

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  5. Why You Should Implement Privacy by Design Before GDPR’s First Birthday

    How do you achieve privacy by design when the GDPR is unspecific on how to do it?

    1. Photo of Tomas Sander

      Tomas Sander

      Director of Data Privacy, Intertrust Corporation

  6. Making the Case for Cybersecurity Investment

    Business leaders are yet to fully embrace the value of cybersecurity.

    1. Photo of Spencer Young

      Spencer Young

      Regional Vice President EMEA, Imperva

  7. Unraveling the Quandary of Access Layer versus Storage Layer Security

    How to ensure security and data access which is flexible enough for regulatory compliance.

    1. Photo of Jelani Harper

      Jelani Harper

      Editorial Consultant

  8. Hacking Video Conferencing Platforms - The Next Big Thing?

    Has society realized the vulnerability dangers within video calling and conferencing technologies.

    1. Photo of Ronen Slavin

      Ronen Slavin

      Head of Research at Reason Cybersecurity

  9. Converged OT/IT Networks Introduce New Security Risks

    At the core of the “Industry 4.0” trend, is the convergence of operations technology (OT) and information technology (IT) networks.

    1. Photo of Reggie  Best

      Reggie Best

      President, Lumeta (a FireMon company)

  10. Dark Net Recruitment is Turning Employees into Malicious Insiders For-Hire

    A growing number of dark web recruitment pages could see your staff snared into an ongoing role.

    1. Photo of Simon Sharp

      Simon Sharp

      International vice president

  11. Implementing ISO 27001 and Avoiding Potential GDPR Consequences

    Steps businesses can take to implement ISO 27001 and avoid potential consequences from the GDPR.

    1. Photo of Matt Stacey

      Matt Stacey

      Managing Director, QMS International

  12. Moody’s Cyber Ratings Could Not Come at a Better Time – if They’re Done Right

    Moody's will add cyber risk into credit ratings, how can that be done?

    1. Photo of Ed Bellis

      Ed Bellis

      Co-founder and CTO, Kenna Security

  13. New Year. New Job. Same Threat.

    The new year means an influx of job applications. How securely are you storing these details?

    1. Photo of Simon Wiseman

      Simon Wiseman

      CTO, Deep Secure

  14. Navigating the Murky Waters of Data Policy Innovation in 2019 and Beyond

    Which barriers does data privacy face in this new year?

    1. Photo of Nick Caley

      Nick Caley

      VP of Financial Services and Regulatory, ForgeRock

  15. The Retail Industry’s Third-Party Data Breach Problem

    Some of the world’s top brands still suffer data breaches as they do not address third-party service threats.

    1. Photo of Ohad Greenshpan

      Ohad Greenshpan

      Co-founder and CTO of Namogoo

  16. Japan and the EU Create a Free Flow of Data

    How the adequacy decision between Japan and the EU will enable and affect data security.

    1. Photo of Claude-Étienne  Armingaud

      Claude-Étienne Armingaud

      Partner, K&L Gates

    2. Photo of Ignasi Guardans

      Ignasi Guardans

      Partner, K&L Gates

    3. Photo of Yuki Sako

      Yuki Sako

      Associate, K&L Gates

  17. Receiving Tons of Unexplained Out-of-office Emails?

    How you can fall victim to an email account takeover, and what the indicators are.

    1. Photo of Asaf Cidon

      Asaf Cidon

      VP Email Security, Barracuda

  18. Accessibility Trumps Security in the Battle Between Authentication Alternatives

    We have the technology to make authentication more secure, so why do we insist on outdated, tired and inferior solutions?

    1. Photo of Rob Otto

      Rob Otto

      EMEA Field CTO, Ping Identity

  19. Why Open Port Monitoring is Both an Essential and Flawed Security Control

    Checking for open ports sounds simple, but the reality is way off.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  20. Is Security The Loser As Open Banking Takes Hold?

    What security challenges does PSD2 and open banking present?

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

What’s hot on Infosecurity Magazine?