Infosecurity Opinions

  1. Don't Undermine Data Security Investments by Dismissing Data Governance

    Data security investments may be useless if poor data governance processes are in place.

    1. Photo of Jim Varner

      Jim Varner

      CEO, SecurityFirst

  2. Selling Servers by Proxy?

    The second-hand server market is thriving but how do you get the most bang for your buck?

    1. Photo of Jeff Bittner

      Jeff Bittner

      Founder and President of Exit Technologies

  3. GDPR and California's New Privacy Could Mean Millions in Costs to Organizations

    Data access requests could result in millions of dollars in operational costs for organizations that already face unprecedented fines in case of a security breach.

  4. A Multi-Pronged Approach to Fighting Fraud with Fingerprinting and Cross-Device

    Cross-device tracking is aimed at crossing the boundaries between a fraudster's individual devices and browsers.

    1. Photo of Stefan Klisarov

      Stefan Klisarov

      Data Scientist, Screen6

  5. Brand Reputation Through Automation

    Firms that embrace cutting-edge application security solutions and automate procedures can stay one step ahead of the hacker

    1. Photo of David Maclean

      David Maclean

      Systems Engineer, F5 Networks

  6. Fighting Fire with Fire: Why Proactive Security is so Vital for Businesses

    More proactive form of defense is necessary and leverages Big Data analytics, network function virtualization, cloud scalability and penetration tactics to handle how cyber-criminals operate.

    1. Photo of Ben Ferguson

      Ben Ferguson

      Senior Network Architect and Vice President of Shamrock Consulting Group

  7. Say Goodbye to Passwords, the Future of Authentication is Here

    The answer to passwords is zero login, using intricate and unique patterns.

    1. Photo of Sarah Squire

      Sarah Squire

      Senior Technical Architect, Ping Identity

  8. Solving PII and Data Security Challenges in a new Compliant World

    How could the Consumer Privacy Act impact your corporate strategy?

  9. Real Security is a Question of Business Value

    CISOs would be wise to ask about overall business value, not just technical value or a solution’s ROI.

    1. Photo of John 'Lex' Robinson

      John 'Lex' Robinson

      Cybersecurity Strategist, Cofense

  10. A Call to Action: Canada's Demand for Cyber Hygiene

    The new plan unveils how Canada will help businesses prevent and respond to attacks, while protecting its own infrastructure.

    1. Photo of Josh Mayfield

      Josh Mayfield

      Director of Security Strategy, Absolute

  11. Staying One Step Ahead - Understanding Breaches to Beat Them

    Without fully understanding the threats, how can businesses expect to prevent, or reduce the likelihood of breaches in the future?

    1. Photo of Jackson Shaw

      Jackson Shaw

      chief strategy officer, Clear Skye

  12. Cybersecurity: A Big Deal in Mergers & Acquisitions

    In an M&A transaction, it is critical to understand the nature and significance of the risk profile in the organization’s network

    1. Photo of Simon Church

      Simon Church

      General Manger and Executive Vice-President, Europe, Optiv

  13. The Reality and the Vision Behind Mobile Security Certificates

    By attaching a secure certificate to a mobile phone number, user identity can be confirmed to service providers via cryptographically secure “identity messages” in the form of a paired key over PKI.

    1. Photo of Wendell Brown

      Wendell Brown

      CEO and co-founder of Averon

  14. The GDPR Aftermath: What Else Can be Done to Improve Data Security

    GDPR is a step in the right direction for securing user privacy in an era of widespread information sharing.

    1. Photo of Shachar Shamir

      Shachar Shamir

      COO of Ranky

  15. How AI Can Tame and Control Shadow IT in the Enterprise

    The resulting blurring between personal and workplace IT functions has opened a Pandora’s Box of cybersecurity woes.

    1. Photo of Zak Rubenstein

      Zak Rubenstein

      CEO, 1touch.io

  16. Dealing With Overlay Attacks: Adopting Built-In Security To Safeguard Mobile Experience

    Overlay malware takes the form of a trojan, and is downloaded as a supposedly legitimate application from a legitimate website or app store.

    1. Photo of Frederik   Mennes

      Frederik Mennes

      Manager Market & Security Strategy at OneSpan

  17. Strengthening Your Digital Core

    If your digital core is weak, what gets thrown off is your organization’s ability to maintain operations, serve customers and generate revenue.

    1. Photo of Thomas MacIsaac

      Thomas MacIsaac

      Cybersecurity strategist, SSH Communications Security

  18. Halfway Through 2018, is This the Year of the Insider Threat?

    Insider threats range from unintentional errors and compromised credentials, to a lack of basic cybersecurity hygiene, all the way through to malevolent insiders.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  19. The Dawn of a New Digital Era for Healthcare Organizations

    With the NHS ready to adopt cloud technology, could this better protect UK healthcare?

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  20. The Two-Step Process to Fix the Internet's Identity Problem

    Two steps to get over the internet's identity problem.

    1. Photo of James Stickland

      James Stickland

      CEO of Veridium

What’s hot on Infosecurity Magazine?