Infosecurity Opinions

  1. TLS is Dead, Long Live TLS

    Why adoption of TLS 1.1 is being forced by the PCI council.

    1. Photo of Timothy Hollebeek

      Timothy Hollebeek

      Industry and Standards Technical Strategist, DigiCert

  2. The Double-Edged Sword of Open-Source Code

    Attackers are well aware how commonly open source code is used.

    1. Photo of Daniela Perlmutter

      Daniela Perlmutter

      Vice-president, CyberInt

  3. BA and Newegg - How Can Friendly Site Javascript Attacks be Stopped?

    Magecart continues to collect high profile victims, why is it so successful?

    1. Photo of Trevor Reschke

      Trevor Reschke

      Head of Threat Intelligence, Trusted Knight

  4. How Do You Secure a Constantly Changing IT Landscape?

    Everyone should understand why cyber hygiene is critical, but IT managers need to understand how to implement the principles.

    1. Photo of Joe Baguley

      Joe Baguley

      Vice President & Chief Technology Officer, EMEA, VMware

  5. Do You TRUST an Organization After it Suffers a Breach?

    Why a data breach means so much more than just the hard costs, and how to prevent the harm.

    1. Photo of Tony Pepper

      Tony Pepper

      CEO, Egress

  6. How Secure are your Biometrics?

    From improvements upon the oversight of passive facial biometrics to recommendations on building technical platforms, there's a national conversation taking place on biometrics.

    1. Photo of George Avetisov

      George Avetisov

      CEO of HYPR

  7. Distributed Correlation and the Future of SIEM

    At the center of an intelligent SOC lies the ability to efficiently extract intelligence from the huge volume

    1. Photo of Chas Clawson

      Chas Clawson

      ArcSight Product Manager at Micro Focus

  8. Don’t Let Privileged Accounts Be a Privilege to Outsiders

    Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye.

    1. Photo of Andrew Clarke

      Andrew Clarke

      Director of strategic alliances & channel partners for EMEA at One Identity

  9. “It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems

    The biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue.

    1. Photo of Mat Clothier

      Mat Clothier

      CEO, CTO and Founder at Cloudhouse

  10. The Evolving Language of Cybersecurity

    Raef Meeuwisse analyzes what is driving the evolution of language in the information security industry

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  11. A Smarter Approach to Security Will Reduce the Risk of Malware

    Preventative action needs to be taken but with security teams and resources spread thin, what more can organizations do to enhance their security?

    1. Photo of Paddy Francis

      Paddy Francis

      CTO for Airbus CyberSecurity

  12. No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

    The three most common threats, according to the ISF's Threat Horizon.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  13. Hackers as Heroes: How Ethical Hacking is Changing the Industry

    Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.

    1. Photo of Laurie Mercer

      Laurie Mercer

      Security Engineer, HackerOne

  14. How Digital Transformation can Save Cybersecurity

    Based on the concepts of digital transformation, an ‘unconventional’ and data-driven approach is needed to thwart new and unforeseen threats.

    1. Photo of Saryu Nayyar

      Saryu Nayyar

      CEO of Gurucul

  15. Preparing for the next European Union Directive: EU NIS

    GDPR concerns every industry that handles data; EU NIS has a much more refined scope as it applies only to critical infrastructure.

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  16. “Zero Trust” Is the Opposite of Business

    When you step back and consider the reason security is important, it’s not so clear that zero trust is really what we want.

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  17. Cybersecurity ROI Is a Measurable Metric – If You Know What to Measure

    Determining true cybersecurity ROI involves not only measuring attacks that were mitigated, but also which attacks might have happened.

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  18. Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?

    Most companies are looking at cybersecurity solutions as a series of “bolt-ons” to the existing tech stack, instead of mapping out a comprehensive plan to help monitor the threat landscape and execute defense against an attack.

    1. Photo of Tim Roncevich

      Tim Roncevich

      partner at CyberGuard Compliance.

  19. Essential Elements Needed for a Successful Threat Hunt

    Threat hunting is vital to reduce the spread and effectiveness of attacks, but a large proportion of organizations are yet to engage in this type of activity.

    1. Photo of Mark Nicholls

      Mark Nicholls

      Director of Cybersecurity, Redscan

  20. From the Developer’s Perspective - Navigating the IoT Security Storm

    In the IoT gold rush, and the race to realize the market’s potential, many companies have been deprioritizing security.

    1. Photo of Evan Dandrea

      Evan Dandrea

      Engineering Manager at Canonical

What’s hot on Infosecurity Magazine?