Infosecurity Opinions

  1. Zero Trust: Method or Madness?

    Zero Trust is a method of security where the central premise is ridiculously simple: trust no one.

    1. Photo of Tim Woods

      Tim Woods

      Vice President of Technology Alliances, FireMon

  2. The Role of Automated Asset Management in Industrial Cybersecurity

    Without an up-to-date and accurate inventory of ICS assets, including the automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.

    1. Photo of Mille Gandelsman

      Mille Gandelsman

      CTO of Indegy

  3. NIS Directive Is a Good Start for Railway Cybersecurity - But It's Not Enough

    Although the NIS Directive represents an essential step towards securing critical infrastructure, its shortcomings are palpable with regard to the rail industry.

    1. Photo of Amir Levintal

      Amir Levintal

      CEO of Cylus

  4. Go Overseas to Solve the US Infosecurity Talent Crunch

    We need to create international security teams, not just those ones who are siloed by countries or individual companies.

    1. Photo of Alan McGlinchey

      Alan McGlinchey

      Vice President of Technology, IDA Ireland

  5. Protecting your Network Against Ever-Changing Cyber-Attacks

    In the age of IoT and cloud, it’s getting worse for these traditional defenses.

    1. Photo of Luke Carmichael

      Luke Carmichael

      Chief Architect at Nokia Deepfield

  6. What Lies Beneath - Avoiding the Unseen Dangers of OT Vulnerabilities

    Attacks on OT systems are rapidly escalating, yet many industrial organizations continue to focus cybersecurity efforts on IT-centric, rather than production-centric, endpoints.

    1. Photo of Scott Hollis

      Scott Hollis

      Director of Product Management at PAS

  7. UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?

    If we don’t take action and follow government guidelines on IoT, then Parliament will be forced to enact legislation.

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  8. Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts

    Companies are adopting privileged account technology to monitor behavior and secure their sensitive data.

    1. Shane Whitlatch

      Executive Vice President, FairWarning

  9. GDPR is a Good Idea For US Companies, Even if it is Not Law

    On the dawn of GDPR, and with the spotlight on major data breaches, perhaps the US is ready to take another run at data privacy regulation.

    1. Photo of Cedric Savarese

      Cedric Savarese

      CEO and founder, FormAssembly

  10. GDPR is Here, So What's Next for Cybersecurity Professionals?

    The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.

    1. Photo of Pierre-Luc Réfalo

      Pierre-Luc Réfalo

      Consulting Director, Cyber Security and Data Protection at Capgemini

  11. Why Supply Chain Security Should be a Strong Link

    Supply chain threats warn that the UK should expect a higher volume of attacks, but also ones with an increased amount of planning.

    1. Photo of Simon McCalla

      Simon McCalla

      CTO, Nominet

  12. Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach

    The Equifax breach and WannaCry ransomware may have nothing in common, but both involved hackers who exploited unpatched vulnerabilities in Windows 7 and Windows 8.

    1. Photo of Tim Roncevich

      Tim Roncevich

      partner at CyberGuard Compliance.

  13. Communication, Collaboration & Orchestration: 10 Vital Steps to IT Alerting Automation

    The challenge for companies is to plan for major IT incidents before they occur and, be able to respond with required velocity, control and communications.

    1. Photo of Mike Beckett

      Mike Beckett

      Enterprise Sales Engineer, IT Alerting, Everbridge

  14. Why the Adoption of Edge Computing Demands a New Approach to Data Security

    Edge computing is defined as moving data processing power to the “edge” of a network, and processing this information at the edge allows for faster response times and consistent data collection.

    1. Photo of Keiron Shepherd

      Keiron Shepherd

      Senior Security Systems Engineer (UK & I) at F5 Networks

  15. Fighting Fire With Fire: AI's Role in Cybersecurity

    AI’s ability to make automated decisions means it is revolutionizing the cybersecurity landscape, from both a defensive and offensive perspective.

    1. Photo of Anthony Chadd

      Anthony Chadd

      Senior director, EMEA, Neustar

  16. How UK Government Policy and Regulation Ensure Cybersecurity Investment Continues To Thrive

    Cybersecurity is becoming an important engine for the creation of British jobs and is a strategically important sector for the country’s defense.

    1. Photo of Nazo Moosa

      Nazo Moosa

      Senior strategic partner, Europe, Paladin Capital Group

  17. Seizing the Benefits of AI and IoT Through Data Security

    The new era of connectivity has introduced disruption for many businesses.

    1. Photo of Asaf Ashkenazi

      Asaf Ashkenazi

      VP, IoT Security Products, Rambus

  18. Navigating the Five Frequent Hazards of IT Security

    Five reasons why security technology implementations commonly fail.

    1. Photo of Simon Church

      Simon Church

      General Manager and Executive Vice President, Europe at Optiv

  19. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions like AI, do we open up the gates to potentially more dangerous and common attacks?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  20. How Businesses Need to Adapt Security Frameworks for the Office of the Future

    IT and data security leaders will have to invest time and effort in network and device security solutions to allow workers the freedom to work and collaborate remotely.

    1. Hiro Imamura

      Senior Vice President and General Manager, Business Imaging Solutions Group, Canon USA

    2. Photo of Hiroyuki

      Hiroyuki "Hiro" Imamura

      SVP and general manager of marketing for the Business Imaging Solutions Group of Canon U.S.A.

What’s hot on Infosecurity Magazine?