Infosecurity Opinions

  1. Education and Training: The Downfall of File-Less Attacks

    How to train employees to understand and identify an advanced "volatile" threat.

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  2. SEC Cybersecurity Update May Lead to Increased Oversight

    What the SEC statement means for companies, who could choose to follow its advice or ignore it altogether.

    1. Photo of Sam Abadir

      Sam Abadir

      Vice President of Industry Solutions, Lockpath

  3. What is KMIP and Why Should Anyone Care?

    KMIP allows the interoperable exchange of data between different key management servers and clients, but why does it matter?

    1. Photo of John Leiseboer

      John Leiseboer

      Founding CTO at QuintessenceLabs

  4. Why Do VPNs Need To Be GDPR Compliant?

    Now GDPR has been in force for over a month, why do VPNs need to be compliant too?

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  5. Security Automation Soars to Top of Agenda

    Security orchestration, automation and response platforms need careful consideration in easing the security management burden.

    1. Photo of Sander Barens

      Sander Barens

      Vice President of Development at Expereo

  6. How Pseudonymous Reputation and the Dark Web Have Made Cybercrime Easier Than Ever

    Today an array of marketplaces, infrastructure, and technology empower much more ordinary actors to commit crime on a massive scale with impunity.

    1. Michael Tiffany

      Co-founder & President, WhiteOps

  7. The Inefficient Battle Against Phishing Attacks and the Technology to Turn the Tides of War

    When enough people flag a sender as spam, they will be blacklisted, but it's important for providers to constantly adapt and block spammer accounts.

    1. Photo of Andrew Goldberg

      Andrew Goldberg

      Chief Scientist at Inky Phish Fence

  8. A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection

    The earlier you can detect a cyber-attack, the higher the probability of preventing data breaches. So what is preventing that early detection?

    1. Photo of John Peterson

      John Peterson

      Chief Product Officer at Aella Data

  9. Detecting and Responding to Cryptojacking with Artificial Intelligence

    How artificial intelligence can help to detect and respond to cyber-criminals harnessing computer power to mine cryptocurrency.

    1. Photo of Matt Walmsley

      Matt Walmsley

      EMEA Director at Vectra Networks

  10. In Bots We Trust: Better Enterprise Security Through AI

    Post GDPR and pre AI, the enterprise needs to entirely transform its thinking about security.

    1. Chris Sussman

      SVP, Operations, Verint Intelligent Self-Service

  11. The Next Big Lesson for Security: Context is King

    We need higher-fidelity alerts contextualized across multiple facets of a system.

    1. Photo of David Pearson

      David Pearson

      Principal Threat Researcher, Awake Security

  12. Security's Role in the Shift Left in Application Security

    As the DevSecOps process requires developers to take greater responsibility for securing software as well as building it, consideration must be given as to what this means for members of the security team.

    1. Photo of Paul Farrington

      Paul Farrington

      Director, EMEA solution architects, Veracode

  13. GDPR: Don't Rest on Your Data, We've Only Just Begun

    May 25 was the starting line, we never know which way regulators and legislators are going to go until they act.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  14. Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics

    Five lessons on how to replicate terror investigations for the benefit of cyber.

    1. Photo of Noam Rosenfeld

      Noam Rosenfeld

      Senior Vice President Research and Development, Cyber Intelligence Solutions, Verint Systems

  15. Access all Areas - Not Anymore!

    Unauthorized access to data is a huge downfall for many businesses.

    1. Photo of Simon Cuthbert

      Simon Cuthbert

      Head of International, 8MAN by Protected Networks

  16. Must Have Factors of a Mobile Security Policy

    Tips on how to build a mobile security policy.

    1. Photo of Alexa Lemzy

      Alexa Lemzy

      Customer support manager at TextMagic

  17. Why Life Under GDPR will Encourage Technology Innovation

    The GDPR is the first step as data protection evolves from compliance to accountability – creating opportunities to develop new services as well as to improve public perceptions.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  18. Do It Yourself? Could be a Painful Experience

    A decision to buy will always be affected by whether or not you trust a vendor.

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  19. Security at the Speed of Business

    Bringing security professionals into the business conversation as early as possible will allow them to lay out a plan where the business can grow but also be secure,

    1. Photo of Craig Riddell

      Craig Riddell

      Senior solutions architect, SSH Communications Security

  20. Batten Down the Hatches against Crypto-Mining Pirates

    Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.

    1. Photo of Aaron McKee

      Aaron McKee

      Director of Cybersecurity and Threat Analytics at Cyxtera

What’s hot on Infosecurity Magazine?