Infosecurity Opinions

  1. Bad Behavior at Work: Protecting Employees from Themselves

    The desire to communicate is hardwired into humans, but with thought - and the deployment of appropriate technology - risk can be mitigated or avoided without impacting productivity or morale.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  2. In Blockchain, There is no Checkmate

    At its core, the Blockchain is immutable, transparent, encrypted and fragmented and.as such, Blockchain and cybersecurity seem like a match made in heaven and for the most part, they are.

    1. Photo of Kjell Grandhagen

      Kjell Grandhagen

      Chief Global Cybersecurity Advisor

  3. Reducing Analyst Fatigue with Machine Learning

    Using machine-learning platforms, security analysts will be able to focus on more important decision-making in situations.

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  4. Is Cloud Migration Complexity Depriving the Public Sector of Security Talent?

    Given the skills gap and the stakes at play, security talent needs to be best deployed where it is most needed – at the front line.

    1. Photo of Nigel Hawthorn

      Nigel Hawthorn

      Data privacy expert, McAfee

  5. For Applications: It’s the Problem, Not the Symptoms

    Why wasted time and investment in application security needs to be stopped, and understand how data is exposed.

    1. Photo of Chetan Conikee

      Chetan Conikee

      CTO of ShiftLeft

  6. Why It’s Time to Nuke the Password

    Where does the solution lay if we are to remove passwords from authentication processes?

    1. Photo of Keith Graham

      Keith Graham

      Chief Technology Officer at SecureAuth and Core Security

  7. How Businesses Can Overcome the Challenges Saas Presents to Compliance

    As organizations continue to ramp up their use of cloud services, organizations must be aware of the threat that SaaS usage poses to continued GDPR compliance.

    1. Photo of Tim Jesser

      Tim Jesser

      Director of Global Product Marketing, Snow Software

  8. TLS is Dead, Long Live TLS

    Why adoption of TLS 1.1 is being forced by the PCI council.

    1. Photo of Timothy Hollebeek

      Timothy Hollebeek

      Industry and Standards Technical Strategist, DigiCert

  9. The Double-Edged Sword of Open-Source Code

    Attackers are well aware how commonly open source code is used.

    1. Photo of Daniela Perlmutter

      Daniela Perlmutter

      Vice-president, CyberInt

  10. BA and Newegg - How Can Friendly Site Javascript Attacks be Stopped?

    Magecart continues to collect high profile victims, why is it so successful?

    1. Photo of Trevor Reschke

      Trevor Reschke

      Head of Threat Intelligence, Trusted Knight

  11. How Do You Secure a Constantly Changing IT Landscape?

    Everyone should understand why cyber hygiene is critical, but IT managers need to understand how to implement the principles.

    1. Photo of Joe Baguley

      Joe Baguley

      Vice President & Chief Technology Officer, EMEA, VMware

  12. Do You TRUST an Organization After it Suffers a Breach?

    Why a data breach means so much more than just the hard costs, and how to prevent the harm.

    1. Photo of Tony Pepper

      Tony Pepper

      CEO, Egress

  13. How Secure are your Biometrics?

    From improvements upon the oversight of passive facial biometrics to recommendations on building technical platforms, there's a national conversation taking place on biometrics.

    1. Photo of George Avetisov

      George Avetisov

      CEO of HYPR

  14. Distributed Correlation and the Future of SIEM

    At the center of an intelligent SOC lies the ability to efficiently extract intelligence from the huge volume

    1. Photo of Chas Clawson

      Chas Clawson

      ArcSight Product Manager at Micro Focus

  15. Don’t Let Privileged Accounts Be a Privilege to Outsiders

    Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye.

    1. Photo of Andrew Clarke

      Andrew Clarke

      Director of strategic alliances & channel partners for EMEA at One Identity

  16. “It’s The Legacy That Gets You”: What is the Threat Of Outdated Systems

    The biggest obstacle to the modern threat of legacy technology is simply cognizance of the issue.

    1. Photo of Mat Clothier

      Mat Clothier

      CEO, CTO and Founder at Cloudhouse

  17. The Evolving Language of Cybersecurity

    Raef Meeuwisse analyzes what is driving the evolution of language in the information security industry

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  18. A Smarter Approach to Security Will Reduce the Risk of Malware

    Preventative action needs to be taken but with security teams and resources spread thin, what more can organizations do to enhance their security?

    1. Photo of Paddy Francis

      Paddy Francis

      CTO for Airbus CyberSecurity

  19. No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

    The three most common threats, according to the ISF's Threat Horizon.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  20. Hackers as Heroes: How Ethical Hacking is Changing the Industry

    Hackers are often portrayed in movies as outsiders who use their computer skills to inflict harm and commit crime.

    1. Photo of Laurie Mercer

      Laurie Mercer

      Security Engineer, HackerOne

What’s hot on Infosecurity Magazine?