Infosecurity Opinions

  1. Fighting Fire With Fire: AI's Role in Cybersecurity

    AI’s ability to make automated decisions means it is revolutionizing the cybersecurity landscape, from both a defensive and offensive perspective.

    1. Photo of Anthony Chadd

      Anthony Chadd

      Senior director, EMEA, Neustar

  2. How UK Government Policy and Regulation Ensure Cybersecurity Investment Continues To Thrive

    Cybersecurity is becoming an important engine for the creation of British jobs and is a strategically important sector for the country’s defense.

    1. Photo of Nazo Moosa

      Nazo Moosa

      Senior strategic partner, Europe, Paladin Capital Group

  3. Seizing the Benefits of AI and IoT Through Data Security

    The new era of connectivity has introduced disruption for many businesses.

    1. Photo of Asaf Ashkenazi

      Asaf Ashkenazi

      VP, IoT Security Products, Rambus

  4. Navigating the Five Frequent Hazards of IT Security

    Five reasons why security technology implementations commonly fail.

    1. Photo of Simon Church

      Simon Church

      General Manager and Executive Vice President, Europe at Optiv

  5. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions like AI, do we open up the gates to potentially more dangerous and common attacks?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  6. How Businesses Need to Adapt Security Frameworks for the Office of the Future

    IT and data security leaders will have to invest time and effort in network and device security solutions to allow workers the freedom to work and collaborate remotely.

    1. Hiro Imamura

      Senior Vice President and General Manager, Business Imaging Solutions Group, Canon USA

    2. Photo of Hiroyuki

      Hiroyuki "Hiro" Imamura

      SVP and general manager of marketing for the Business Imaging Solutions Group of Canon U.S.A.

  7. Are Smart Cities Smart Enough to Tackle Cyber Attacks?

    How smart cities can be security nightmares, but with the right regulation could there be a bright and secure future?

    1. Photo of Evan Morris

      Evan Morris

      Network Security Manager

  8. Microsoft's Commandment: Thou Shalt Not Worship (Password) Idols

    Active Directory centralizes authentication and authorization for domain resources, but also creates a critical single point of failure.

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  9. Preventing the Cloud from Becoming a Digital Dumping Ground

    Cloud has perhaps had the biggest impact on security owing purely to its scale.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  10. How to Secure Your Data, Smart Tech, and Digital Assistants

    AI devices open up a slew of privacy questions that leave businesses stuck choosing between efficiency and data security.

    1. Photo of Sage Singleton

      Sage Singleton

      Digital Journalist

  11. Security Analyst: The New Data Scientist

    Data science skills have become more common as Universities offer a wide selection of courses on the subject.

    1. Photo of Rick Costanzo

      Rick Costanzo

      CEO, RANK Software

  12. Standardization in the Year of the Chatbot

    Successful organizations will be asking not only what AI – or more automation – can do for them, but how they can adapt processes and security protocols to AI.

    1. Photo of Mike Guggemos

      Mike Guggemos

      CIO, Insight

  13. The Pros and Cons of DIY Application Security

    How can open source and internally-built security not end up as a “Franken-platform”?

    1. Photo of Mike Kail

      Mike Kail

      CTO, CYBRIC

  14. Ways for MSSPs to Survive in the New Infosec Age

    To remain competitive and profitable while maintaining quality of service, MSSPs must change their mindsets.

    1. Photo of Adi Dar

      Adi Dar

      CEO of Cyberbit

  15. Measure and Manage Your Cloud Security in Five Steps

    Cloud security will always be governed by rules, measuring against those rules will help you define your purpose and identify the goals you need to hit.

    1. John Martinez

      VP of Customer Solutions at Evident.io

  16. Five Security “Gotchas” for MSPs

    Common attacker tricks which plague the managed security provider.

    1. Photo of Tyler Moffitt

      Tyler Moffitt

      Senior Threat Researcher, Webroot

  17. Think You Know Ransomware? Think Again

    Where did ransomware come from, is it a new threat, how is it evolving and what steps can organizations take to protect against it?

    1. Photo of Ian Goslin

      Ian Goslin

      Managing Director, Airbus CyberSecurity UK

  18. The Implications of Silent Injection Malware on Retail Security

    Malware specifically targeted at point of sale devices has evolved over the past few years.

    1. Photo of Jorg Abraham

      Jorg Abraham

      senior threat intelligence analyst at EclecticIQ

  19. Data Security Obligations Could be Increased in North Carolina

    How North Carolina's data protection obligations could be the most stringent in the USA.

    1. Photo of Saad Gul

      Saad Gul

      Partner, Poyner Spruill LLP

    2. Photo of Michael Slipsky

      Michael Slipsky

      Partner at Poyner Spruill LLP

  20. Life Under #GDPR and What It Means for Cybersecurity

    What you should know about how GDPR will shift the landscape of cybersecurity, and what measures to take to be ready.

    1. Photo of Josh Eichorn

      Josh Eichorn

      CTO, Pagely

What’s hot on Infosecurity Magazine?