Infosecurity Opinions

  1. Get Rid of your Database Security “Hairball” with Database Security 2.0

    How SaaS, AI/machine learning, and unified database visibility play a critical role for achieving comprehensive security in today’s on-prem and multi-cloud database environments.

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  2. Protecting Private Data in Virtual Environments with New Encryption Approaches

    New approaches for encryption protection in virtual environments.

    1. Anand Kashyap

      Co-Founder and CTO, Fortanix

  3. Securing Against Developer Pressure

    It is no longer acceptable to consider any connected software a finished product.

    1. Photo of Jamie Bennett

      Jamie Bennett

      VP of Engineering, IoT & Devices at Canonical

  4. Strengthen Data Breach Defenses with Emulation Assessments

    With data breach emulation, assessments are based on the use of actual attack components.

    1. David De Santo

      Director of products and threat research, Spirent

  5. The Power of Quantum: Reshaping the Cybersecurity Landscape

    Quantum computing promises medical breakthroughs, important scientific discoveries and key developments in manufacturing.

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  6. Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning

    Penetration tests can fail before they even start, thanks to poor scoping.

    1. Photo of Tod  Beardsley

      Tod Beardsley

      Director of Research, Rapid7

  7. Resolving the Tension between Hybrid/Multi-Cloud Settings and Greater Attack Surfaces

    Beyond deperimeterization, on-premise, hybrid and multi-cloud use cases merely expands organizational attack surface

    1. Photo of Jelani Harper

      Jelani Harper

      Editorial Consultant

  8. The Impact of AI on the Cybercrime Economy

    The cyber-criminal community will adjust and accelerate their development effort using AI and machine learning technologies.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  9. How to Integrate Business Security Systems

    Is it better to buy a multi-functional suite with all the features or separate technology for the different areas you need to protect?

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  10. Passwordless Authentication is Finally on the Horizon

    Will the new year continue a trend of passwordless authentication?

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  11. The Best Data Breach Tactics to Deploy Now

    Two tactics to raise the bar of security to protect yourself and discourage attackers.

    1. Photo of Arshad Noor

      Arshad Noor

      CTO, StrongKey

  12. Fight Phishing with Benchmarking and Simulation Training

    Benchmarking is an extremely valuable tool for figuring out how your organization is thwarting phishing attacks.

    1. Photo of Dennis Dillman

      Dennis Dillman

      VP of Product Management and Security Awareness, Barracuda Networks

  13. No Target is Too Small: Why SMEs Must be Cyber-Resilient

    Smaller businesses are more vulnerable to cyber-attacks than enterprises, and so need to be more cybersecurity-savvy.

    1. Photo of Marc Wilczek

      Marc Wilczek

      Chief Operating Officer, Link11

  14. Guest Editor: A Passion for Cybersecurity

    Cybersecurity is one of those careers that engenders real job satisfaction and passion amongst those working in the industry

    1. Photo of James Lyne

      James Lyne

      Head of Research and Development, SANS Institute

  15. #2018InReview Malware and Threats

    A look back at the rocky road of 2018's threats, attacks and malware.

    1. Photo of Sean Sullivan

      Sean Sullivan

      Security Advisor, F-Secure

  16. Guest Editor: Tackling the Growth of BEC Attacks

    By addressing the problems of cybersecurity at the technical, physical and human level, we are putting ourselves in the best position to resist BEC

    1. Photo of Jessica  Barker

      Jessica Barker

      Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

  17. Guest Editor: Breaking the Barriers of Security

    I have come to embrace that these barriers have helped shape the budding security professional I am today

    1. Photo of Sophia McCall

      Sophia McCall

      Cyber Security Student, Pen-Testing Intern/Junior Security Consultant

  18. #2018InReview Application Security and Software Development

    2019 should be the year organizations look inward to make securing their own software and applications.

    1. Photo of Paul Farrington

      Paul Farrington

      Director, EMEA solution architects, Veracode

  19. Guest Editor: Our Cyber Glass Ceiling

    Our choice is very simple, we can either bemoan the status quo or identify an approach that allows us to articulate our business value in a quantifiable way

    1. Photo of Raj Samani

      Raj Samani

      Chief Scientist and McAfee Fellow, McAfee

  20. #2018InReview Compliance and GDPR

    Looking at the year in compliance, the impact of GDPR and how much more the DPO needs to play a role in the business.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

What’s hot on Infosecurity Magazine?