Infosecurity Opinions

  1. Emerging Attack Vector: Why the Security Industry Should Treat Electronic Invoicing like Electronic Health Records

    E-invoicing remains in its infancy but it could suffer from the same security risks as electronic health records..

    1. Photo of John Strasser

      John Strasser

      CSO, Sovos Compliance

  2. Moving Towards Pay-as-you-Go Cybersecurity

    As digital agility is increasingly seen as a key business advantage, businesses need to challenge the status quo and move towards a new model of cybersecurity consumption.

    1. Photo of Greg Day

      Greg Day

      VP & Global CISO, Cybereason

  3. Magecart is the Largest Payment Card Theft in History - What You Can Do

    What can site owners do today to minimize the risk of card skimming via third party tools?

    1. Photo of Ross Hogan

      Ross Hogan

      Chief Revenue Officer at Source Defense

  4. Version Upgrades and Security/Privacy Downgrades: A Cautionary Tale

    Getting upgrades right from a security and privacy viewpoint will never be a perfect process, but if we focus on making sure that we’re not losing track of privacy, security and compliance, we have a better chance of getting it right.

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

  5. GDPR Fear is Stifling Employees, Here’s How to Fix It

    A level of accountability is, of course, necessary, because businesses will not be GDPR compliant without it.

    1. Photo of Ian Osborne

      Ian Osborne

      Vice President UK & Ireland, Shred-it

  6. Bad Behavior at Work: Protecting Employees from Themselves

    The desire to communicate is hardwired into humans, but with thought - and the deployment of appropriate technology - risk can be mitigated or avoided without impacting productivity or morale.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  7. In Blockchain, There is no Checkmate

    At its core, the Blockchain is immutable, transparent, encrypted and fragmented and.as such, Blockchain and cybersecurity seem like a match made in heaven and for the most part, they are.

    1. Photo of Kjell Grandhagen

      Kjell Grandhagen

      Chief Global Cybersecurity Advisor

  8. Reducing Analyst Fatigue with Machine Learning

    Using machine-learning platforms, security analysts will be able to focus on more important decision-making in situations.

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  9. Is Cloud Migration Complexity Depriving the Public Sector of Security Talent?

    Given the skills gap and the stakes at play, security talent needs to be best deployed where it is most needed – at the front line.

    1. Photo of Nigel Hawthorn

      Nigel Hawthorn

      Data privacy expert, McAfee

  10. For Applications: It’s the Problem, Not the Symptoms

    Why wasted time and investment in application security needs to be stopped, and understand how data is exposed.

    1. Photo of Chetan Conikee

      Chetan Conikee

      CTO of ShiftLeft

  11. Why It’s Time to Nuke the Password

    Where does the solution lay if we are to remove passwords from authentication processes?

    1. Photo of Keith Graham

      Keith Graham

      Chief Technology Officer at SecureAuth and Core Security

  12. How Businesses Can Overcome the Challenges Saas Presents to Compliance

    As organizations continue to ramp up their use of cloud services, organizations must be aware of the threat that SaaS usage poses to continued GDPR compliance.

    1. Photo of Tim Jesser

      Tim Jesser

      Director of Global Product Marketing, Snow Software

  13. TLS is Dead, Long Live TLS

    Why adoption of TLS 1.1 is being forced by the PCI council.

    1. Photo of Timothy Hollebeek

      Timothy Hollebeek

      Industry and Standards Technical Strategist, DigiCert

  14. The Double-Edged Sword of Open-Source Code

    Attackers are well aware how commonly open source code is used.

    1. Photo of Daniela Perlmutter

      Daniela Perlmutter

      Vice-president, CyberInt

  15. BA and Newegg - How Can Friendly Site Javascript Attacks be Stopped?

    Magecart continues to collect high profile victims, why is it so successful?

    1. Photo of Trevor Reschke

      Trevor Reschke

      Head of Threat Intelligence, Trusted Knight

  16. How Do You Secure a Constantly Changing IT Landscape?

    Everyone should understand why cyber hygiene is critical, but IT managers need to understand how to implement the principles.

    1. Photo of Joe Baguley

      Joe Baguley

      Vice President & Chief Technology Officer, EMEA, VMware

  17. Do You TRUST an Organization After it Suffers a Breach?

    Why a data breach means so much more than just the hard costs, and how to prevent the harm.

    1. Photo of Tony Pepper

      Tony Pepper

      CEO, Egress

  18. How Secure are your Biometrics?

    From improvements upon the oversight of passive facial biometrics to recommendations on building technical platforms, there's a national conversation taking place on biometrics.

    1. Photo of George Avetisov

      George Avetisov

      CEO of HYPR

  19. Distributed Correlation and the Future of SIEM

    At the center of an intelligent SOC lies the ability to efficiently extract intelligence from the huge volume

    1. Photo of Chas Clawson

      Chas Clawson

      ArcSight Product Manager at Micro Focus

  20. Don’t Let Privileged Accounts Be a Privilege to Outsiders

    Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye.

    1. Photo of Andrew Clarke

      Andrew Clarke

      Director of strategic alliances & channel partners for EMEA at One Identity

What’s hot on Infosecurity Magazine?