Infosecurity Opinions

  1. “It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems

    The biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue.

    1. Photo of Mat Clothier

      Mat Clothier

      CEO, CTO and Founder at Cloudhouse

  2. The Evolving Language of Cybersecurity

    Raef Meeuwisse analyzes what is driving the evolution of language in the information security industry

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  3. A Smarter Approach to Security Will Reduce the Risk of Malware

    Preventative action needs to be taken but with security teams and resources spread thin, what more can organizations do to enhance their security?

    1. Photo of Paddy Francis

      Paddy Francis

      CTO for Airbus CyberSecurity

  4. No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

    The three most common threats, according to the ISF's Threat Horizon.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  5. Hackers as Heroes: How Ethical Hacking is Changing the Industry

    Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.

    1. Photo of Laurie Mercer

      Laurie Mercer

      Security Engineer, HackerOne

  6. How Digital Transformation can Save Cybersecurity

    Based on the concepts of digital transformation, an ‘unconventional’ and data-driven approach is needed to thwart new and unforeseen threats.

    1. Photo of Saryu Nayyar

      Saryu Nayyar

      CEO of Gurucul

  7. Preparing for the next European Union Directive: EU NIS

    GDPR concerns every industry that handles data; EU NIS has a much more refined scope as it applies only to critical infrastructure.

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  8. “Zero Trust” Is the Opposite of Business

    When you step back and consider the reason security is important, it’s not so clear that zero trust is really what we want.

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  9. Cybersecurity ROI Is a Measurable Metric – If You Know What to Measure

    Determining true cybersecurity ROI involves not only measuring attacks that were mitigated, but also which attacks might have happened.

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  10. Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?

    Most companies are looking at cybersecurity solutions as a series of “bolt-ons” to the existing tech stack, instead of mapping out a comprehensive plan to help monitor the threat landscape and execute defense against an attack.

    1. Photo of Tim Roncevich

      Tim Roncevich

      partner at CyberGuard Compliance.

  11. Essential Elements Needed for a Successful Threat Hunt

    Threat hunting is vital to reduce the spread and effectiveness of attacks, but a large proportion of organizations are yet to engage in this type of activity.

    1. Photo of Mark Nicholls

      Mark Nicholls

      Director of Cybersecurity, Redscan

  12. From the Developer’s Perspective - Navigating the IoT Security Storm

    In the IoT gold rush, and the race to realize the market’s potential, many companies have been deprioritizing security.

    1. Photo of Evan Dandrea

      Evan Dandrea

      Engineering Manager at Canonical

  13. McDreary? The Future of Medical Call Centers & DDoS

    A DDoS attack on a healthcare system can cause click-to-call features to be taken offline, and the implications can mean life or death.

    1. Photo of Mark Pietras

      Mark Pietras

      CTO and co-founder, Revation Systems

  14. Teaching Old Dogs New Tricks

    Security teams need to gain an understanding of each application within their network and find out how it interacts with external entities.

    1. Photo of Christopher Steffen

      Christopher Steffen

      Technical Director at Cyxtera

  15. Cloudy With a Chance of Cryptojacking

    Cloudjacking is a growing trend: stealing processing and storage from someone else’s cloud account.

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  16. The Importance of Device Security in IoT Ecosystems

    It is crucial that the resiliency of IoT devices are understood to prevent systemic security issues in the future.

    1. Photo of Dave Belt

      Dave Belt

      Technology Evangelist, Irdeto

  17. Quantum: The future For Data Center Technology

    How will advances in quantum computing affect the data center industry, and will these effects be positive?

    1. Photo of Jeremy Schaller

      Jeremy Schaller

      Industry Analyst at Exit Technologies

  18. What Europe Can do to Catch Dark Web Criminals

    Could the Europol dark web investigation team succeed in pinning down underground attackers?

    1. Photo of Liran Sorani

      Liran Sorani

      Cyber Business Unit Manager, Webhose

  19. How Immutable Infrastructure Changes the Modern Security Mindset

    How the rise of cloud-native applications are changing the security game.

    1. Photo of John  Morello

      John Morello

      Chief Technology Officer at Twistlock

  20. Why Businesses Can't Ignore Crypto Agility

    Crypto agility encompasses the range of policies, technology and initiatives organizations must dedicate themselves to in becoming resilient against quantum computing

    1. Photo of Malte Pollmann

      Malte Pollmann

      CEO, Utimaco

What’s hot on Infosecurity Magazine?