Infosecurity Opinions

  1. Are Micro Businesses in the Dark Over Cybersecurity?

    How vulnerable are micro businesses to cyber threats?

    1. Photo of Simon  Yeoman

      Simon Yeoman

      CEO, Fasthosts

  2. Why Deep Defense Should Start with Detecting Compromised Credentials

    Obtaining valid credentials using multiple mechanisms and tools continues to be extremely lucrative for a cyber-criminal

    1. Photo of Jose Miguel Esparza

      Jose Miguel Esparza

      Head of Threat Intelligence at Blueliv

  3. Why is ‘Attribution’ Still the Focus Following Cyber Attacks?

    Our obsession with “who” is behind an attack, instead of the “how” left attackers with a sandbox to deploy, test and adjust the level of sophistication of their attack capabilities.

    1. Chris O'Brien

      Director, intelligence operations, EclecticIQ

  4. Managing Firewalls in the Cloud: do Companies Know Enough about Security Intent?

    Businesses think less about centralized firewalls, and more about cloud.

    1. Photo of Tim Woods

      Tim Woods

      Vice President of Technology Alliances, FireMon

  5. Attack is the Best Form of Defense, Time to go Threat Hunting

    Traditional (reactive) cybersecurity defense should be used in conjunction with proactive cyber threat hunting.

    1. Photo of Paul Fletcher

      Paul Fletcher

      Security Technical Account Manager, Rackspace Managed Security

    2. Photo of Danny O'Neill

      Danny O'Neill

      Head of Rackspace Managed Security, EMEA

  6. A Little Less Complication: Does the UK Need a New Cyber Council?

    If approved, what impact would a UK Cybersecurity Council have?

    1. Photo of Andrew Barratt

      Andrew Barratt

      Vice President, Technology & Enterprise, Managing Director, International, Coalfire

  7. OWASP Sting: How Education Can Take the Bite out of Common Vulnerabilities

    It should be a wake-up call to the industry that the most common security threats have remained nearly unchanged since the first OWASP list 15 years ago.

    1. Photo of Brian Kelly

      Brian Kelly

      Head of Engineering, CyberArk

  8. Cybersecurity, Conference Lineups and Kenan Thompson

    Certainly, conference organizers bear ultimate responsibility for their speaker lineup.

    1. Photo of Sandy Carielli

      Sandy Carielli

      Director of Security Technologies, Entrust Datacard

  9. How Social Media Postings Can Lead to Significant Liability and Penalties

    Failure to police social media postings by corporate insiders can result in reputational harm, litigation, financial penalties, and mandated governance and oversight changes. But what are the recommended best practices to mitigate such risks?

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

    2. Photo of Ken Joseph

      Ken Joseph

      Managing Director, Duff & Phelps

  10. The GDPR Disclosure Conundrum

    New rules imposed by the EU can be particularly challenging for organizations to disclose a breach within such a tight a timeframe.

    1. Photo of Lindsey Ullian

      Lindsey Ullian

      Compliance Manager at Threat Stack

  11. The Central Role Of Authentication In Threats To, And Defenses For Modern Democracies

    Few can resist the fact that cybersecurity is now a critical concern for democracy.

    1. Photo of Federico Carbone

      Federico Carbone

      Regional Solutions Architect, Ping Identity

  12. Taking Cryptojacking Out of the Shadows

    The only way to truly prevent cryptojacking is to prevent the malware from getting installed in the first place, rather than waiting to detect it post-breach.

    1. Photo of Yoram Salinger

      Yoram Salinger

      CEO of Perception Point

  13. The Role of Blockchain in Data Security

    As Blockchain technology re-architects our digital infrastructure, it also reformulates the security equation.

    1. Photo of Serg Metelin

      Serg Metelin

      Head of Developer Relations, Block.one

  14. Designing Security UI for a Modern, Tech-Savvy Workforce

    Perhaps one of the biggest problems the cybersecurity industry has is its image.

    1. Photo of Sylvain Gil

      Sylvain Gil

      Vice President of Product and Co-founder, Exabeam

  15. Putting Security at the Heart of Digital Transformation

    As organizations gain more agility, it’s imperative that security is not just invited along on the journey.

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  16. This Time it’s Personal – The Growing Threat of SMiShing Attacks

    SMiShing attacks use SMS texting as the medium and is often used in conjunction with other attacks.

    1. Photo of Stephen Burke

      Stephen Burke

      Founder & CEO, Cyber Risk Aware

  17. How a ‘National Security Help Desk’ Could Secure Critical National Infrastructure

    The increasingly connected nature of CNI presents an opportunity for cybersecurity skills and knowledge to spread fast and wide.

    1. Photo of Adam Byrne

      Adam Byrne

      CEO at RealVNC

  18. Centralize your Data, Achieve Long-Term GDPR Compliance

    Data storage became so simple and affordable, but what impact does GDPR have on this?

    1. John O’Keeffe

      VP of EMEA, Looker

  19. Is Hype Around AI Muddling the Message for IT Decision Makers?

    While it is nice to think that AI and machine learning are a ‘silver bullet' it’s simply not true, and to think otherwise, could put businesses at greater risk.

    1. Photo of Jake Moore

      Jake Moore

      Global Cybersecurity Advisor, ESET

  20. Re-Thinking DDoS Defenses for TLS1.3

    Can TLS1.3 enable better DDoS defence?

    1. Photo of Darren Anstee

      Darren Anstee

      Chief Technology Officer, NETSCOUT Arbor

What’s hot on Infosecurity Magazine?