Infosecurity Opinions

  1. Must Have Factors of a Mobile Security Policy

    Tips on how to build a mobile security policy.

    1. Photo of Alexa Lemzy

      Alexa Lemzy

      Customer support manager at TextMagic

  2. Why Life Under GDPR will Encourage Technology Innovation

    The GDPR is the first step as data protection evolves from compliance to accountability – creating opportunities to develop new services as well as to improve public perceptions.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  3. Do It Yourself? Could be a Painful Experience

    A decision to buy will always be affected by whether or not you trust a vendor.

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  4. Security at the Speed of Business

    Bringing security professionals into the business conversation as early as possible will allow them to lay out a plan where the business can grow but also be secure,

    1. Photo of Craig Riddell

      Craig Riddell

      Senior solutions architect, SSH Communications Security

  5. Batten Down the Hatches against Crypto-Mining Pirates

    Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.

    1. Photo of Aaron McKee

      Aaron McKee

      Director of Cybersecurity and Threat Analytics at Cyxtera

  6. We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

    Virtual Patching is emerging as a solution to the problem of too many unapplied software fixes.

    1. Photo of James E. Lee

      James E. Lee

      Executive Vice-President, Waratek

  7. How Much do Passwords Cost your Business?

    The cost of supporting password systems, including staffing and infrastructure, can be significant for today’s digital businesses

    1. Sandor Palfy

      CTO, Lastpass

  8. DMARC Will Not Make Email Secure

    DMARC will make little, if any, difference in improving email security respecting phishing because DMARC inadequately addresses both the technical proficiency of dedicated threat actors and their tools of psychological manipulation.

    1. Photo of Robert Zager

      Robert Zager

      Security Researcher at Iconix

  9. Somebody Else's Security: Rethinking Cloud FUD

    The list of enterprise IT organizations who had their private data publicly exposed in 2017 because of misconfigured AWS S3 buckets is long.

    1. Photo of Terry Ray

      Terry Ray

      SVP, Imperva

  10. Effectively Managing Mistrust for Optimal Cybersecurity

    It’s vital that businesses work together to share information to stay one step ahead of the ever-evolving threat landscape.

    1. Chris O'Brien

      Director, intelligence operations, EclecticIQ

  11. Undermining Crypto-Threats

    Cryptomining has the potential to be as big a threat a ransomware, and it is harder for law enforcement to track the perpetrators.

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

  12. Establishing Trust in a World without Boundaries

    This brave new world has new security challenges, necessitating a new strategy based on a perimeter-less, “zero-trust” approach.

    1. Photo of Ash Devata

      Ash Devata

      VP of Products, Duo Security

  13. Protecting Privileged Identities: Why IAM starts with PAM

    Like any good security measure designed to protect critical information assets, managing and protecting privileged accounts requires both a plan and an ongoing program

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  14. Bouncing Back from Cyber Attack

    Knowing where to get started a cyber-attack specific disaster recovery plan is always half the battle..

    1. Photo of Brent Whitfield

      Brent Whitfield

      CEO of DCG Technical Solutions Inc

  15. Zero Trust: Method or Madness?

    Zero Trust is a method of security where the central premise is ridiculously simple: trust no one.

    1. Photo of Tim Woods

      Tim Woods

      Vice President of Technology Alliances, FireMon

  16. The Role of Automated Asset Management in Industrial Cybersecurity

    Without an up-to-date and accurate inventory of ICS assets, including the automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.

    1. Photo of Mille Gandelsman

      Mille Gandelsman

      CTO of Indegy

  17. NIS Directive Is a Good Start for Railway Cybersecurity - But It's Not Enough

    Although the NIS Directive represents an essential step towards securing critical infrastructure, its shortcomings are palpable with regard to the rail industry.

    1. Photo of Amir Levintal

      Amir Levintal

      CEO of Cylus

  18. Go Overseas to Solve the US Infosecurity Talent Crunch

    We need to create international security teams, not just those ones who are siloed by countries or individual companies.

    1. Photo of Alan McGlinchey

      Alan McGlinchey

      Vice President of Technology, IDA Ireland

  19. Protecting your Network Against Ever-Changing Cyber-Attacks

    In the age of IoT and cloud, it’s getting worse for these traditional defenses.

    1. Photo of Luke Carmichael

      Luke Carmichael

      Chief Architect at Nokia Deepfield

  20. What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities

    Attacks on OT systems are rapidly escalating, yet many industrial organizations continue to focus cybersecurity efforts on IT-centric, rather than production-centric, endpoints.

    1. Photo of Scott Hollis

      Scott Hollis

      Director of Product Management at PAS

What’s hot on Infosecurity Magazine?