Infosecurity Opinions

  1. #2018InReview Application Security and Software Development

    2019 should be the year organizations look inward to make securing their own software and applications.

    1. Photo of Paul Farrington

      Paul Farrington

      Director, EMEA solution architects, Veracode

  2. Guest Editor: Our Cyber Glass Ceiling

    Our choice is very simple, we can either bemoan the status quo or identify an approach that allows us to articulate our business value in a quantifiable way

    1. Photo of Raj Samani

      Raj Samani

      SVP, Chief Scientist, Rapid7

  3. #2018InReview Compliance and GDPR

    Looking at the year in compliance, the impact of GDPR and how much more the DPO needs to play a role in the business.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  4. #2018InReview IoT Security

    How did IoT security improve, or not, over the past 12 months?

    1. Photo of David Dufour

      David Dufour

      Vice President of Engineering & Cybersecurity, Webroot

  5. #2018InReview Women and Diversity in Cybersecurity

    In 2018, the industry began waking up to diversity in all its forms – experience, thinking, age, gender, ethnicity.

    1. Photo of Jane Frankland

      Jane Frankland

      Founder of Cybersecurity Capital and the IN Security Movement

  6. #2018InReview Security Culture

    How much did security culture levels improve in 2018, and what were the determining factors if so?

    1. Photo of Aimee Laycock

      Aimee Laycock

      COO, CLTRe

  7. Why the CISO’s Voice Must be Heard Beyond the IT Department

    A CISO needs empowerment to influence budget decisions, project decisions and even IT decisions

    1. Michalis Kamprianis

      CISO, Strategist, International Speaker

  8. #2018InReview Government Security

    Looking back at the year in government security, in compliance, legislation and when two cities were locked down by ransomware.

    1. Photo of Jim Varner

      Jim Varner

      CEO, SecurityFirst

  9. #2018InReview Cloud Security

    Spending in cloud security increased in 2018, as IaaS platforms became the norm.

    1. Photo of Darron Gibbard

      Darron Gibbard

      Chief Technical Security Officer, Qualys

  10. #2018InReview Subtle Shifts in Financial Services Security

    While compliance dominated 2018, subtle shifts affected financial services security too.

    1. Photo of Stephen Bonner

      Stephen Bonner

      Cyber Risk Partner, Deloitte

  11. #2018InReview Healthcare Cybersecurity

    How 2018 proved to be a constant challenge for those in healthcare cybersecurity.

    1. Photo of Tom Gilheany

      Tom Gilheany

      Portfolio manager of security training and certifications, Cisco Services

  12. #2018InReview Cybersecurity Awareness

    What the cybersecurity year looked like from an awareness perspective.

    1. Photo of Lauren Zink

      Lauren Zink

      Security Awareness Manager, AmTrust Financial

  13. A Little Chaos Now and Then is the Best Test for Resilience

    How Chaos engineering and testing can work for you.

    1. Kiran Chitturi

      CTO Architect, Sungard Availabilty Services

  14. Geo-Velocity Based Adaptive Authentication: A New Layer of Security for Enterprise Information Systems

    Geo-velocity based authentication relates the login history of users with their login locations.

    1. Photo of Gangani Ariyarathne

      Gangani Ariyarathne

      Intern Software Engineer, WS02

    2. Photo of Miyuru Dayarathna

      Miyuru Dayarathna

      Senior Technical Lead, WS02

  15. Why Investment in Autonomous Cyber Defense is Needed

    We need to be investing in the potential of non-human defenses.

    1. Photo of Paul Theron

      Paul Theron

      Professor of Cyber-secure Engineering Systems and Processes, Cranfield University

  16. Are Micro Businesses in the Dark Over Cybersecurity?

    How vulnerable are micro businesses to cyber threats?

    1. Photo of Simon  Yeoman

      Simon Yeoman

      CEO, Fasthosts

  17. Why Deep Defense Should Start with Detecting Compromised Credentials

    Obtaining valid credentials using multiple mechanisms and tools continues to be extremely lucrative for a cyber-criminal

    1. Photo of Jose Miguel Esparza

      Jose Miguel Esparza

      Head of Threat Intelligence at Blueliv

  18. Why is ‘Attribution’ Still the Focus Following Cyber Attacks?

    Our obsession with “who” is behind an attack, instead of the “how” left attackers with a sandbox to deploy, test and adjust the level of sophistication of their attack capabilities.

    1. Chris O'Brien

      Director, intelligence operations, EclecticIQ

  19. Managing Firewalls in the Cloud: do Companies Know Enough about Security Intent?

    Businesses think less about centralized firewalls, and more about cloud.

    1. Photo of Tim Woods

      Tim Woods

      Vice President of Technology Alliances, FireMon

  20. Attack is the Best Form of Defense, Time to go Threat Hunting

    Traditional (reactive) cybersecurity defense should be used in conjunction with proactive cyber threat hunting.

    1. Photo of Paul Fletcher

      Paul Fletcher

      Security Technical Account Manager, Rackspace Managed Security

    2. Photo of Danny O'Neill

      Danny O'Neill

      Head of Rackspace Managed Security, EMEA

What’s hot on Infosecurity Magazine?