Infosecurity Opinions

  1. How Social Media Postings Can Lead to Significant Liability and Penalties

    Failure to police social media postings by corporate insiders can result in reputational harm, litigation, financial penalties, and mandated governance and oversight changes. But what are the recommended best practices to mitigate such risks?

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

    2. Photo of Ken Joseph

      Ken Joseph

      Managing Director, Duff & Phelps

  2. The GDPR Disclosure Conundrum

    New rules imposed by the EU can be particularly challenging for organizations to disclose a breach within such a tight a timeframe.

    1. Photo of Lindsey Ullian

      Lindsey Ullian

      Compliance Manager at Threat Stack

  3. The Central Role Of Authentication In Threats To, And Defenses For Modern Democracies

    Few can resist the fact that cybersecurity is now a critical concern for democracy.

    1. Photo of Federico Carbone

      Federico Carbone

      Regional Solutions Architect, Ping Identity

  4. Taking Cryptojacking Out of the Shadows

    The only way to truly prevent cryptojacking is to prevent the malware from getting installed in the first place, rather than waiting to detect it post-breach.

    1. Photo of Yoram Salinger

      Yoram Salinger

      CEO of Perception Point

  5. The Role of Blockchain in Data Security

    As Blockchain technology re-architects our digital infrastructure, it also reformulates the security equation.

    1. Photo of Serg Metelin

      Serg Metelin

      Head of Developer Relations, Block.one

  6. Designing Security UI for a Modern, Tech-Savvy Workforce

    Perhaps one of the biggest problems the cybersecurity industry has is its image.

    1. Photo of Sylvain Gil

      Sylvain Gil

      Vice President of Product and Co-founder, Exabeam

  7. Putting Security at the Heart of Digital Transformation

    As organizations gain more agility, it’s imperative that security is not just invited along on the journey.

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  8. This Time it’s Personal – The Growing Threat of SMiShing Attacks

    SMiShing attacks use SMS texting as the medium and is often used in conjunction with other attacks.

    1. Photo of Stephen Burke

      Stephen Burke

      Founder & CEO, Cyber Risk Aware

  9. How a ‘National Security Help Desk’ Could Secure Critical National Infrastructure

    The increasingly connected nature of CNI presents an opportunity for cybersecurity skills and knowledge to spread fast and wide.

    1. Photo of Adam Byrne

      Adam Byrne

      CEO at RealVNC

  10. Centralize your Data, Achieve Long-Term GDPR Compliance

    Data storage became so simple and affordable, but what impact does GDPR have on this?

    1. John O’Keeffe

      VP of EMEA, Looker

  11. Is Hype Around AI Muddling the Message for IT Decision Makers?

    While it is nice to think that AI and machine learning are a ‘silver bullet' it’s simply not true, and to think otherwise, could put businesses at greater risk.

    1. Photo of Jake Moore

      Jake Moore

      Global Cybersecurity Advisor, ESET

  12. Re-Thinking DDoS Defenses for TLS1.3

    Can TLS1.3 enable better DDoS defence?

    1. Photo of Darren Anstee

      Darren Anstee

      Chief Technology Officer, NETSCOUT Arbor

  13. Don’t Go Once More Unto the Breach: Fix Those Policy Configuration Mistakes

    Examining four common security policy errors, and how organizations can avoid them.

    1. Photo of Asher Benbenisty

      Asher Benbenisty

      Director of product marketing, AlgoSec

  14. What to Expect from VPNs in 2020

    Cybersecurity analysts are predicting positive future trends on the VPN industry.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  15. Putting TLS Pinning in Your Mobile Apps

    Why TLS certificate pinning can aid your mobile security.

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  16. How AI and Machine Learning Will Win or Lose the War in Cyber

    If AI and machine learning have arrived to defend our corporate networks, how can we reconcile these competing memes?

    1. Photo of Dustin Hillard

      Dustin Hillard

      CTO, Versive

  17. There is no Training - Strava's Heatmap Incident and Aftermath Paints a Bleak Picture

    The Department of Defence's advice on Strava heat maps came far too late.

    1. Photo of Ana Dascalescu

      Ana Dascalescu

      Digital specialist and content creator at Heimdal Security

  18. What is the Standard for IoT Security?

    There are no standards for IoT security, and whatever the superficial attractions of the devices, there is no reassurance that you won’t get more than you bargained for.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  19. Email Still Poses a Cyber-Threat, but There is Hope

    Despite the availability of tools and technologies such as email encryption, sandboxing and artificial intelligence, headlines have been dominated by news of email-borne attacks.

    1. Photo of Liron Barak

      Liron Barak

      CEO and Co-Founder of BitDam

  20. Containers and Security – Which Potential Issues Will You Face?

    Containerization is now starting to move from the early adopter phase to be adopted by the early majority.

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

What’s hot on Infosecurity Magazine?