Infosecurity Opinions

  1. Preventing the Next Ransomware Attack

    While there is no simple solution to protect against ransomware attacks, there are a few key tactics that security teams can take that will boost their immunity.

    1. Photo of Dan Larson

      Dan Larson

      Vice President Product Marketing, CrowdStrike

  2. Cryptocurrency Hacking Raises Threats of Financial Vulnerability

    A dependence on cryptocurrencies increases, we will see more and more social engineering attacks used to steal digital coinag

    1. Photo of Jack Miller

      Jack Miller

      CISO, SlashNext

  3. Why There is Still a Role for VDI in the Security World

    Despite the rush to move applications to the cloud, VDI’s security benefits mean it still has a place in today’s corporate networks.

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  4. Explicit Content at Work: The Dangers of Unrestricted Internet Access

    The dangers of unrestricted internet access leaving corporate data open to cyber-criminals.

    1. Photo of Alvaro Hoyos

      Alvaro Hoyos

      Chief Information Security Officer, OneLogin

  5. Does Patching Make Perfect?

    The process of installing updates and patches has become so highly complex that it, in and of itself, may create new complications.

    1. Photo of Ilan  Paretsky

      Ilan Paretsky

      Chief Marketing Officer at Ericom Software

  6. Is Your City Smart Enough to Tackle GDPR?

    The success of productivity and efficiency, ushered in by the IoT revolution, has given rise to a new breed of connectivity: the smart city.

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  7. Cloud Data Remains Your Responsibility

    Your data may be held in an external cloud, but you cannot abdicate your own security responsibilities.

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  8. Advanced Phishing Threat Protection Requires Security at the Mailbox Level

    Because it is inevitable that phishing messages will land in employees’ inboxes, it is essential that every employee have mailbox-level detection.

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  9. Government Needs to Get Serious About Text Messaging

    Our government is far too lax with its communication policies and lets employees get away with unregulated, unsecure and inappropriate communication.

    1. Photo of Anurag Lal

      Anurag Lal

      CEO of NetSfere

  10. Is GDPR a Tax or an Incentive?

    The common perception is that security and compliance activities reduce profit margins.

    1. Photo of Mike Fleck

      Mike Fleck

      VP of Security at Covata

  11. The Compliance Conundrum

    Why should businesses be trusting public cloud services with their compliance needs?

    1. Photo of Mark Baker

      Mark Baker

      Field Product Manager, Canonical

  12. Gender Inequality in Information Security

    The fact of the matter is that we have a culture in our industry that isn’t inclusive of women.

    1. Photo of Evan Francen

      Evan Francen

      CEO, FRSecure

  13. Cyber Gangs Get Smarter

    Why internationally-orchestrated cyber-attacks are continuing to succeed.

    1. Photo of Elad Ben-Meir

      Elad Ben-Meir

      CEO, SCADAfence

  14. Are We Aware Yet?

    We’re just not human centric. If you want better results, let people be people, and design accordingly.

    1. Photo of Dr Richard Ford

      Dr Richard Ford

      Chief Scientist at Forcepoint

  15. Why are most Compliance Requirements Completely Nonsensical?

    It doesn’t matter which compliance regulation you talk about, each gets a collective groan from businesses whenever it arises on the agenda.

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  16. Why Governments Will Play a Key Role in the Future of IoT Security

    Policymakers will need to work with the private industry to create a framework for reliable IoT security that actively protects privacy without hindering innovation.

    1. Photo of Gary Weiss

      Gary Weiss

      Senior vice president, general manager security, discovery, and analytics, OpenText

  17. Why and How You Should Harden Your Systems

    Putting protective measures in place will strengthen your security posture, and there are tools and resources to help you.

    1. Photo of Rami Sass

      Rami Sass

      CEO and Co-Founder of WhiteSource

  18. Building Open Source Security into DevOps

    Unless developers are logging the open source code they use in an automated fashion, identifying that information later will be a 'best-guess' scenario.

    1. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  19. Psychology of Ransomware: How Extortionists Use Fear, Anger and Humor to Hold Your Data Hostage

    Examining the psychology of ransomware attacks and how cyber-criminals prey on our intrinsic human emotions to get what they want.

    1. Photo of Jeremiah Grossman

      Jeremiah Grossman

      Chief of Security Strategy, SentinelOne

  20. Finding Meaning in the GDPR’s Language

    Reading through the GDPR can fill a business owner with an equal mix of confusion and anxiety

    1. Photo of David  Feldman

      David Feldman

      CEO CYBONET

What’s hot on Infosecurity Magazine?