Infosecurity Opinions

  1. UK Government's IoT Best Practices are a Wake-Up Call to Manufacturers, Will They Hit Snooze?

    If we don’t take action and follow government guidelines on IoT, then Parliament will be forced to enact legislation.

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  2. Want to Keep Your Data Safe? Secure Your Organization’s Privileged User Accounts

    Companies are adopting privileged account technology to monitor behavior and secure their sensitive data.

    1. Shane Whitlatch

      Executive Vice President, FairWarning

  3. GDPR is a Good Idea For US Companies, Even if it is Not Law

    On the dawn of GDPR, and with the spotlight on major data breaches, perhaps the US is ready to take another run at data privacy regulation.

    1. Photo of Cedric Savarese

      Cedric Savarese

      CEO and founder, FormAssembly

  4. GDPR is Here, So What's Next for Cybersecurity Professionals?

    The deadline for GDPR compliance has arrived, and it marks a new era for data protection in Europe and beyond.

    1. Photo of Pierre-Luc Réfalo

      Pierre-Luc Réfalo

      Consulting Director, Cyber Security and Data Protection at Capgemini

  5. Why Supply Chain Security Should be a Strong Link

    Supply chain threats warn that the UK should expect a higher volume of attacks, but also ones with an increased amount of planning.

    1. Photo of Simon McCalla

      Simon McCalla

      CTO, Nominet

  6. Why Unpatched Vulnerabilities Will Likely Cause Your Next Breach

    The Equifax breach and WannaCry ransomware may have nothing in common, but both involved hackers who exploited unpatched vulnerabilities in Windows 7 and Windows 8.

    1. Photo of Tim Roncevich

      Tim Roncevich

      partner at CyberGuard Compliance.

  7. Communication, Collaboration & Orchestration: 10 Vital Steps to IT Alerting Automation

    The challenge for companies is to plan for major IT incidents before they occur and, be able to respond with required velocity, control and communications.

    1. Photo of Mike Beckett

      Mike Beckett

      Enterprise Sales Engineer, IT Alerting, Everbridge

  8. Why the Adoption of Edge Computing Demands a New Approach to Data Security

    Edge computing is defined as moving data processing power to the “edge” of a network, and processing this information at the edge allows for faster response times and consistent data collection.

    1. Photo of Keiron Shepherd

      Keiron Shepherd

      Senior Security Systems Engineer (UK & I) at F5 Networks

  9. Fighting Fire With Fire: AI's Role in Cybersecurity

    AI’s ability to make automated decisions means it is revolutionizing the cybersecurity landscape, from both a defensive and offensive perspective.

    1. Photo of Anthony Chadd

      Anthony Chadd

      Senior director, EMEA, Neustar

  10. How UK Government Policy and Regulation Ensure Cybersecurity Investment Continues To Thrive

    Cybersecurity is becoming an important engine for the creation of British jobs and is a strategically important sector for the country’s defense.

    1. Photo of Nazo Moosa

      Nazo Moosa

      Senior strategic partner, Europe, Paladin Capital Group

  11. Seizing the Benefits of AI and IoT Through Data Security

    The new era of connectivity has introduced disruption for many businesses.

    1. Photo of Asaf Ashkenazi

      Asaf Ashkenazi

      VP, IoT Security Products, Rambus

  12. Navigating the Five Frequent Hazards of IT Security

    Five reasons why security technology implementations commonly fail.

    1. Photo of Simon Church

      Simon Church

      General Manager and Executive Vice President, Europe at Optiv

  13. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions like AI, do we open up the gates to potentially more dangerous and common attacks?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  14. How Businesses Need to Adapt Security Frameworks for the Office of the Future

    IT and data security leaders will have to invest time and effort in network and device security solutions to allow workers the freedom to work and collaborate remotely.

    1. Hiro Imamura

      Senior Vice President and General Manager, Business Imaging Solutions Group, Canon USA

    2. Photo of Hiroyuki

      Hiroyuki "Hiro" Imamura

      SVP and general manager of marketing for the Business Imaging Solutions Group of Canon U.S.A.

  15. Are Smart Cities Smart Enough to Tackle Cyber Attacks?

    How smart cities can be security nightmares, but with the right regulation could there be a bright and secure future?

    1. Photo of Evan Morris

      Evan Morris

      Network Security Manager

  16. Microsoft's Commandment: Thou Shalt Not Worship (Password) Idols

    Active Directory centralizes authentication and authorization for domain resources, but also creates a critical single point of failure.

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  17. Preventing the Cloud from Becoming a Digital Dumping Ground

    Cloud has perhaps had the biggest impact on security owing purely to its scale.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  18. How to Secure Your Data, Smart Tech, and Digital Assistants

    AI devices open up a slew of privacy questions that leave businesses stuck choosing between efficiency and data security.

    1. Photo of Sage Singleton

      Sage Singleton

      Digital Journalist

  19. Security Analyst: The New Data Scientist

    Data science skills have become more common as Universities offer a wide selection of courses on the subject.

    1. Photo of Rick Costanzo

      Rick Costanzo

      CEO, RANK Software

  20. Standardization in the Year of the Chatbot

    Successful organizations will be asking not only what AI – or more automation – can do for them, but how they can adapt processes and security protocols to AI.

    1. Photo of Mike Guggemos

      Mike Guggemos

      CIO, Insight

What’s hot on Infosecurity Magazine?