Infosecurity Opinions

  1. Say Goodbye to Passwords, the Future of Authentication is Here

    The answer to passwords is zero login, using intricate and unique patterns.

    1. Photo of Sarah Squire

      Sarah Squire

      Senior Technical Architect, Ping Identity

  2. Solving PII and Data Security Challenges in a new Compliant World

    How could the Consumer Privacy Act impact your corporate strategy?

  3. Real Security is a Question of Business Value

    CISOs would be wise to ask about overall business value, not just technical value or a solution’s ROI.

    1. Photo of John 'Lex' Robinson

      John 'Lex' Robinson

      Cybersecurity Strategist, Cofense

  4. A Call to Action: Canada's Demand for Cyber Hygiene

    The new plan unveils how Canada will help businesses prevent and respond to attacks, while protecting its own infrastructure.

    1. Photo of Josh Mayfield

      Josh Mayfield

      Director of Security Strategy, Absolute

  5. Staying One Step Ahead - Understanding Breaches to Beat Them

    Without fully understanding the threats, how can businesses expect to prevent, or reduce the likelihood of breaches in the future?

    1. Photo of Jackson Shaw

      Jackson Shaw

      chief strategy officer, Clear Skye

  6. Cybersecurity: A Big Deal in Mergers & Acquisitions

    In an M&A transaction, it is critical to understand the nature and significance of the risk profile in the organization’s network

    1. Photo of Simon Church

      Simon Church

      General Manger and Executive Vice-President, Europe, Optiv

  7. The Reality and the Vision Behind Mobile Security Certificates

    By attaching a secure certificate to a mobile phone number, user identity can be confirmed to service providers via cryptographically secure “identity messages” in the form of a paired key over PKI.

    1. Photo of Wendell Brown

      Wendell Brown

      CEO and co-founder of Averon

  8. The GDPR Aftermath: What Else Can be Done to Improve Data Security

    GDPR is a step in the right direction for securing user privacy in an era of widespread information sharing.

    1. Photo of Shachar Shamir

      Shachar Shamir

      COO of Ranky

  9. How AI Can Tame and Control Shadow IT in the Enterprise

    The resulting blurring between personal and workplace IT functions has opened a Pandora’s Box of cybersecurity woes.

    1. Photo of Zak Rubenstein

      Zak Rubenstein

      CEO, 1touch.io

  10. Dealing With Overlay Attacks: Adopting Built-In Security To Safeguard Mobile Experience

    Overlay malware takes the form of a trojan, and is downloaded as a supposedly legitimate application from a legitimate website or app store.

    1. Photo of Frederik   Mennes

      Frederik Mennes

      Manager Market & Security Strategy at OneSpan

  11. Strengthening Your Digital Core

    If your digital core is weak, what gets thrown off is your organization’s ability to maintain operations, serve customers and generate revenue.

    1. Photo of Thomas MacIsaac

      Thomas MacIsaac

      Cybersecurity strategist, SSH Communications Security

  12. Halfway Through 2018, is This the Year of the Insider Threat?

    Insider threats range from unintentional errors and compromised credentials, to a lack of basic cybersecurity hygiene, all the way through to malevolent insiders.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  13. The Dawn of a New Digital Era for Healthcare Organizations

    With the NHS ready to adopt cloud technology, could this better protect UK healthcare?

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  14. The Two-Step Process to Fix the Internet's Identity Problem

    Two steps to get over the internet's identity problem.

    1. Photo of James Stickland

      James Stickland

      CEO of Veridium

  15. Will a New SOC Help the NHS Stop the Next WannaCry?

    The implementation of an SOC is a firm step in the right direction for the NHS, but it must provide the visibility and secure access required for a massive operation like the NHS.

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  16. From Zero Day Attack to Zero Day Recovery

    With Zero Day Recovery, data can be recovered quickly, minimizing or even eliminating the damage that a destructive cyber-attack would have caused the business.

    1. Photo of Marie Clutterbuck

      Marie Clutterbuck

      Chief Marketing Officer, Tectrade

  17. Advanced Persistent Agony: Fixing the Broken Data Breach Response Template

    The standard response playbook to a major data breach is harmful to security professionals.

    1. Photo of Matt Cauthorn

      Matt Cauthorn

      VP of Security for ExtraHop

  18. How to Balance Security with Digital Transformation

    IT security professionals are struggling to keep up with the technologies that drive digital transformation.

    1. Photo of Bob Egner

      Bob Egner

      VP at Outpost24

  19. Overcoming the Siloed Network Security Challenge

    Unlike IT teams, cyber-criminals aren’t constrained by lines of business, siloed technology teams, or carefully guarded network domains.

    1. Photo of Steve Mulhearn

      Steve Mulhearn

      Director of Enhanced Technologies, Fortinet

  20. The New Age of Accountability

    Accountability refers to an obligation on individuals and businesses to be held responsible for their data protection actions and activities, and to accept liability for data breaches.

    1. Photo of Howard Williams

      Howard Williams

      Marketing Director, Parker Software

What’s hot on Infosecurity Magazine?