Infosecurity Opinions

  1. Is Hype Around AI Muddling the Message for IT Decision Makers?

    While it is nice to think that AI and machine learning are a ‘silver bullet' it’s simply not true, and to think otherwise, could put businesses at greater risk.

    1. Photo of Jake Moore

      Jake Moore

      Global Cybersecurity Advisor, ESET

  2. Re-Thinking DDoS Defenses for TLS1.3

    Can TLS1.3 enable better DDoS defence?

    1. Photo of Darren Anstee

      Darren Anstee

      Chief Technology Officer, NETSCOUT Arbor

  3. Don’t Go Once More Unto the Breach: Fix Those Policy Configuration Mistakes

    Examining four common security policy errors, and how organizations can avoid them.

    1. Photo of Asher Benbenisty

      Asher Benbenisty

      Director of product marketing, AlgoSec

  4. What to Expect from VPNs in 2020

    Cybersecurity analysts are predicting positive future trends on the VPN industry.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  5. Putting TLS Pinning in Your Mobile Apps

    Why TLS certificate pinning can aid your mobile security.

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  6. How AI and Machine Learning Will Win or Lose the War in Cyber

    If AI and machine learning have arrived to defend our corporate networks, how can we reconcile these competing memes?

    1. Photo of Dustin Hillard

      Dustin Hillard

      CTO, Versive

  7. There is no Training - Strava's Heatmap Incident and Aftermath Paints a Bleak Picture

    The Department of Defence's advice on Strava heat maps came far too late.

    1. Photo of Ana Dascalescu

      Ana Dascalescu

      Digital specialist and content creator at Heimdal Security

  8. What is the Standard for IoT Security?

    There are no standards for IoT security, and whatever the superficial attractions of the devices, there is no reassurance that you won’t get more than you bargained for.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  9. Email Still Poses a Cyber-Threat, but There is Hope

    Despite the availability of tools and technologies such as email encryption, sandboxing and artificial intelligence, headlines have been dominated by news of email-borne attacks.

    1. Photo of Liron Barak

      Liron Barak

      CEO and Co-Founder of BitDam

  10. Containers and Security – Which Potential Issues Will You Face?

    Containerization is now starting to move from the early adopter phase to be adopted by the early majority.

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  11. Emerging Attack Vector: Why the Security Industry Should Treat Electronic Invoicing like Electronic Health Records

    E-invoicing remains in its infancy but it could suffer from the same security risks as electronic health records..

    1. Photo of John Strasser

      John Strasser

      CSO, Sovos Compliance

  12. Moving Towards Pay-as-you-Go Cybersecurity

    As digital agility is increasingly seen as a key business advantage, businesses need to challenge the status quo and move towards a new model of cybersecurity consumption.

    1. Photo of Greg Day

      Greg Day

      VP & Global CISO, Cybereason

  13. Magecart is the Largest Payment Card Theft in History - What You Can Do

    What can site owners do today to minimize the risk of card skimming via third party tools?

    1. Photo of Ross Hogan

      Ross Hogan

      Chief Revenue Officer at Source Defense

  14. Version Upgrades and Security/Privacy Downgrades: A Cautionary Tale

    Getting upgrades right from a security and privacy viewpoint will never be a perfect process, but if we focus on making sure that we’re not losing track of privacy, security and compliance, we have a better chance of getting it right.

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

  15. GDPR Fear is Stifling Employees, Here’s How to Fix It

    A level of accountability is, of course, necessary, because businesses will not be GDPR compliant without it.

    1. Photo of Ian Osborne

      Ian Osborne

      Vice President UK & Ireland, Shred-it

  16. Bad Behavior at Work: Protecting Employees from Themselves

    The desire to communicate is hardwired into humans, but with thought - and the deployment of appropriate technology - risk can be mitigated or avoided without impacting productivity or morale.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  17. In Blockchain, There is no Checkmate

    At its core, the Blockchain is immutable, transparent, encrypted and fragmented and.as such, Blockchain and cybersecurity seem like a match made in heaven and for the most part, they are.

    1. Photo of Kjell Grandhagen

      Kjell Grandhagen

      Chief Global Cybersecurity Advisor

  18. Reducing Analyst Fatigue with Machine Learning

    Using machine-learning platforms, security analysts will be able to focus on more important decision-making in situations.

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  19. Is Cloud Migration Complexity Depriving the Public Sector of Security Talent?

    Given the skills gap and the stakes at play, security talent needs to be best deployed where it is most needed – at the front line.

    1. Photo of Nigel Hawthorn

      Nigel Hawthorn

      Data privacy expert, McAfee

  20. For Applications: It’s the Problem, Not the Symptoms

    Why wasted time and investment in application security needs to be stopped, and understand how data is exposed.

    1. Photo of Chetan Conikee

      Chetan Conikee

      CTO of ShiftLeft

What’s hot on Infosecurity Magazine?