Infosecurity Opinions

  1. The Pros and Cons of DIY Application Security

    How can open source and internally-built security not end up as a “Franken-platform”?

    1. Photo of Mike Kail

      Mike Kail

      CTO, CYBRIC

  2. Ways for MSSPs to Survive in the New Infosec Age

    To remain competitive and profitable while maintaining quality of service, MSSPs must change their mindsets.

    1. Photo of Adi Dar

      Adi Dar

      CEO of Cyberbit

  3. Measure and Manage Your Cloud Security in Five Steps

    Cloud security will always be governed by rules, measuring against those rules will help you define your purpose and identify the goals you need to hit.

    1. John Martinez

      VP of Customer Solutions at Evident.io

  4. Five Security “Gotchas” for MSPs

    Common attacker tricks which plague the managed security provider.

    1. Photo of Tyler Moffitt

      Tyler Moffitt

      Senior Threat Researcher, Webroot

  5. Think You Know Ransomware? Think Again

    Where did ransomware come from, is it a new threat, how is it evolving and what steps can organizations take to protect against it?

    1. Photo of Ian Goslin

      Ian Goslin

      Managing Director, Airbus CyberSecurity UK

  6. The Implications of Silent Injection Malware on Retail Security

    Malware specifically targeted at point of sale devices has evolved over the past few years.

    1. Photo of Jorg Abraham

      Jorg Abraham

      senior threat intelligence analyst at EclecticIQ

  7. Data Security Obligations Could be Increased in North Carolina

    How North Carolina's data protection obligations could be the most stringent in the USA.

    1. Photo of Saad Gul

      Saad Gul

      Partner, Poyner Spruill LLP

    2. Photo of Michael Slipsky

      Michael Slipsky

      Partner at Poyner Spruill LLP

  8. Life Under #GDPR and What It Means for Cybersecurity

    What you should know about how GDPR will shift the landscape of cybersecurity, and what measures to take to be ready.

    1. Photo of Josh Eichorn

      Josh Eichorn

      CTO, Pagely

  9. What Organizations Can Do to Strengthen Their Cybersecurity Stance

    There are times when organizations, even those with SOCs that are skilled and staffed appropriately, may need a little help.

    1. Pradeep Aswani

      General manager, Ingram Micro

  10. 2018 Faces New Threats, But Same old Problems

    Every year brings a new set of cyber-threats but threats of 2017, 2016 and beyond are still with us.

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  11. Could Your Company Become a Cryptojacking Victim?

    Attackers find it cheaper to mine cryptocurrency by infiltrating and accessing someone else’s CPU or GPU power than pay for it themselves.

    1. Min Pyo Hong

      CEO and Founder, SEWORKS

  12. It Is Time for the CISO to be at the Table

    A CISO in the boardroom is still an odd occurrence, so does the CISO need to change the way they think and interact with the business?

    1. Photo of Neal Creighton

      Neal Creighton

      Chief Executive Officer of CounterTack

  13. Building a Successful Data-Centric Audit and Compliance Program

    A successful implementation of DCAP will eliminate the complexity and inefficiencies of today’s silo-based data security environments.

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  14. GDPR and the State of Employee Data Privacy

    Rather than trying to fix each problem individually, ask what is the best way to truly control information?

    1. Photo of Kon Leong

      Kon Leong

      CEO and Co-founder of ZL Technologies

  15. Common IT Tools are the Hacker's Favorites

    Monitoring and analyzing common IT tools will make life harder for attackers.

    1. Photo of Roman Blachman

      Roman Blachman

      Chief Technology Officer and co-founder of Preempt

  16. How to do More With Less in Cybersecurity

    Security teams are under-resourced and over-pressured, so how can they do more with less?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  17. Klepto Currency: Are Hackers Cryptojacking Your Processing Power?

    In the race to generate currency, “miners” are utilizing clever tools and techniques to gain access to computing resources

    1. Photo of Joshua Behar

      Joshua Behar

      President and CEO of Ericom Software

  18. 'Western' and 'Eastern' Approaches in DLP Solutions

    The differences between ‘western’ and ‘eastern’ approaches in the use of DLP solutions.

    1. Photo of Dzianis  Putsikau

      Dzianis Putsikau

      Analyst at Falcongaze

  19. Accidental Insiders Pose a Serious Threat to Your Organization

    The unintentional insider threat can be equally risky to the organization and is unfortunately quite common.

    1. Photo of Mike McKee

      Mike McKee

      CEO, ObserveIT

  20. Avoid These Security Mistakes During Cloud Migration

    How it is the “people” and “process” categories – that companies often miss during a cloud migration.

    1. Photo of Brad Bussie

      Brad Bussie

      Principal Security Strategist for Trace3.

What’s hot on Infosecurity Magazine?