Infosecurity Opinions

  1. Common IT Tools are the Hacker's Favorites

    Monitoring and analyzing common IT tools will make life harder for attackers.

    1. Photo of Roman Blachman

      Roman Blachman

      Chief Technology Officer and co-founder of Preempt

  2. How to do More With Less in Cybersecurity

    Security teams are under-resourced and over-pressured, so how can they do more with less?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. Klepto Currency: Are Hackers Cryptojacking Your Processing Power?

    In the race to generate currency, “miners” are utilizing clever tools and techniques to gain access to computing resources

    1. Photo of Joshua Behar

      Joshua Behar

      President and CEO of Ericom Software

  4. 'Western' and 'Eastern' Approaches in DLP Solutions

    The differences between ‘western’ and ‘eastern’ approaches in the use of DLP solutions.

    1. Photo of Dzianis  Putsikau

      Dzianis Putsikau

      Analyst at Falcongaze

  5. Accidental Insiders Pose a Serious Threat to Your Organization

    The unintentional insider threat can be equally risky to the organization and is unfortunately quite common.

    1. Photo of Mike McKee

      Mike McKee

      CEO, ObserveIT

  6. Avoid These Security Mistakes During Cloud Migration

    How it is the “people” and “process” categories – that companies often miss during a cloud migration.

    1. Photo of Brad Bussie

      Brad Bussie

      Principal Security Strategist for Trace3.

  7. Working Smarter: Use Machine Learning to Merge IAM and SIEM

    IAM and SIEM systems can give organizations the insight and clarity they so desperately need.

    1. Photo of Rashmi Knowles

      Rashmi Knowles

      EMEA Field CTO, RSAC

  8. GDPR is Not a Ticking Timebomb for Huge Fines

    Organizations are being told that on the 25th May they will go into compliance meltdown: It’s all got a bit out of hand to be honest.

    1. Photo of Jason Coggins

      Jason Coggins

      UK & European sales team lead at Lepide.

  9. Why Cyber Insurance Works

    Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.

    1. Photo of Greg Reber

      Greg Reber

      Founder and CEO of AsTech Consulting

  10. Building a Security Culture in the Age of GDPR

    GDPR will present an opportunity to evolve from a systems-based approach to a data-driven one.

    1. Photo of Mark Crosbie

      Mark Crosbie

      Global Head of Trust and Privacy, Dropbox

  11. Spectre and Meltdown: Powerful Reminders of Side Channel Attacks

    Many organizations had a recent experience with side channel attacks when security researchers announced the discovery of Meltdown and Spectre.

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  12. Does Ransomware-as-a-Service Enable More Cyber-Criminals?

    Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.

    1. Photo of Dorka Palotay

      Dorka Palotay

      Threat researcher, Sophos

  13. The Tesla Hack is a Serious Cryptojacking Warning

    The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.

    1. Daniel Nelson

      AVP, Product Management, BMC Software

  14. Cryptojacking: Back to the Future

    Cryptojacking is the perfect combination of two of the Internet's hottest trends - rampant hacking and the massive growth of cryptocurrencies.

    1. Photo of Seth Berman

      Seth Berman

      Partner, Nutter

  15. Preventing the Next Ransomware Attack

    While there is no simple solution to protect against ransomware attacks, there are a few key tactics that security teams can take that will boost their immunity.

    1. Photo of Dan Larson

      Dan Larson

      Vice President Product Marketing, CrowdStrike

  16. Cryptocurrency Hacking Raises Threats of Financial Vulnerability

    A dependence on cryptocurrencies increases, we will see more and more social engineering attacks used to steal digital coinag

    1. Photo of Jack Miller

      Jack Miller

      CISO, SlashNext

  17. Why There is Still a Role for VDI in the Security World

    Despite the rush to move applications to the cloud, VDI’s security benefits mean it still has a place in today’s corporate networks.

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  18. Explicit Content at Work: The Dangers of Unrestricted Internet Access

    The dangers of unrestricted internet access leaving corporate data open to cyber-criminals.

    1. Photo of Alvaro Hoyos

      Alvaro Hoyos

      Chief Information Security Officer, OneLogin

  19. Does Patching Make Perfect?

    The process of installing updates and patches has become so highly complex that it, in and of itself, may create new complications.

    1. Photo of Ilan  Paretsky

      Ilan Paretsky

      Chief Marketing Officer at Ericom Software

  20. Is Your City Smart Enough to Tackle GDPR?

    The success of productivity and efficiency, ushered in by the IoT revolution, has given rise to a new breed of connectivity: the smart city.

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

What’s hot on Infosecurity Magazine?