Infosecurity Opinions

  1. Working Smarter: Use Machine Learning to Merge IAM and SIEM

    IAM and SIEM systems can give organizations the insight and clarity they so desperately need.

    1. Photo of Rashmi Knowles

      Rashmi Knowles

      EMEA Field CTO, RSAC

  2. GDPR is Not a Ticking Timebomb for Huge Fines

    Organizations are being told that on the 25th May they will go into compliance meltdown: It’s all got a bit out of hand to be honest.

    1. Photo of Jason Coggins

      Jason Coggins

      UK & European sales team lead at Lepide.

  3. Why Cyber Insurance Works

    Deciding how much cyber insurance to buy is no trivial matter, and the responsibility rests directly with the Board of Directors.

    1. Photo of Greg Reber

      Greg Reber

      Founder and CEO of AsTech Consulting

  4. Building a Security Culture in the Age of GDPR

    GDPR will present an opportunity to evolve from a systems-based approach to a data-driven one.

    1. Photo of Mark Crosbie

      Mark Crosbie

      Global Head of Trust and Privacy, Dropbox

  5. Spectre and Meltdown: Powerful Reminders of Side Channel Attacks

    Many organizations had a recent experience with side channel attacks when security researchers announced the discovery of Meltdown and Spectre.

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  6. Does Ransomware-as-a-Service Enable More Cyber-Criminals?

    Ready-made solutions, known as ‘Ransomware-as-a-Service’ (RaaS), are now incredibly easy to obtain through the Dark Web.

    1. Photo of Dorka Palotay

      Dorka Palotay

      Threat researcher, Sophos

  7. The Tesla Hack is a Serious Cryptojacking Warning

    The Tesla infection shows how cyber-criminals are continuing to develop more sophisticated techniques to target large organizations.

    1. Daniel Nelson

      AVP, Product Management, BMC Software

  8. Cryptojacking: Back to the Future

    Cryptojacking is the perfect combination of two of the Internet's hottest trends - rampant hacking and the massive growth of cryptocurrencies.

    1. Photo of Seth Berman

      Seth Berman

      Partner, Nutter

  9. Preventing the Next Ransomware Attack

    While there is no simple solution to protect against ransomware attacks, there are a few key tactics that security teams can take that will boost their immunity.

    1. Photo of Dan Larson

      Dan Larson

      Vice President Product Marketing, CrowdStrike

  10. Cryptocurrency Hacking Raises Threats of Financial Vulnerability

    A dependence on cryptocurrencies increases, we will see more and more social engineering attacks used to steal digital coinag

    1. Photo of Jack Miller

      Jack Miller

      CISO, SlashNext

  11. Why There is Still a Role for VDI in the Security World

    Despite the rush to move applications to the cloud, VDI’s security benefits mean it still has a place in today’s corporate networks.

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  12. Explicit Content at Work: The Dangers of Unrestricted Internet Access

    The dangers of unrestricted internet access leaving corporate data open to cyber-criminals.

    1. Photo of Alvaro Hoyos

      Alvaro Hoyos

      Chief Information Security Officer, OneLogin

  13. Does Patching Make Perfect?

    The process of installing updates and patches has become so highly complex that it, in and of itself, may create new complications.

    1. Photo of Ilan  Paretsky

      Ilan Paretsky

      Chief Marketing Officer at Ericom Software

  14. Is Your City Smart Enough to Tackle GDPR?

    The success of productivity and efficiency, ushered in by the IoT revolution, has given rise to a new breed of connectivity: the smart city.

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  15. Cloud Data Remains Your Responsibility

    Your data may be held in an external cloud, but you cannot abdicate your own security responsibilities.

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  16. Advanced Phishing Threat Protection Requires Security at the Mailbox Level

    Because it is inevitable that phishing messages will land in employees’ inboxes, it is essential that every employee have mailbox-level detection.

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  17. Government Needs to Get Serious About Text Messaging

    Our government is far too lax with its communication policies and lets employees get away with unregulated, unsecure and inappropriate communication.

    1. Photo of Anurag Lal

      Anurag Lal

      CEO of NetSfere

  18. Is GDPR a Tax or an Incentive?

    The common perception is that security and compliance activities reduce profit margins.

    1. Photo of Mike Fleck

      Mike Fleck

      VP of Security at Covata

  19. The Compliance Conundrum

    Why should businesses be trusting public cloud services with their compliance needs?

    1. Photo of Mark Baker

      Mark Baker

      Field Product Manager, Canonical

  20. Gender Inequality in Information Security

    The fact of the matter is that we have a culture in our industry that isn’t inclusive of women.

    1. Photo of Evan Francen

      Evan Francen

      CEO, FRSecure

What’s hot on Infosecurity Magazine?