Infosecurity Opinions

  1. Bridging the Gap Between IT Security and IT Operations

    Trust between IT and Security is key to an effective and efficient protection.

    1. Photo of Jean-Christophe Gaillard

      Jean-Christophe Gaillard

      Founder and Managing Director of Corix Partners

  2. Cyber Threats 101: Fileless Attacks (The Stealthiest of All)

    Fileless malware - malicious scripts that hijack legitimate software, without installing themselves on the hard drive at all.

    1. Photo of Eldon Sprickerhoff

      Eldon Sprickerhoff

      Founder and chief security strategist at eSentire

  3. Insider Threat Detection in a Borderless World

    Detecting insider threats in this new environment also requires a different approach. One that combines securing applications, locking down identities and monitoring how identities use applications.

    1. Photo of Saryu Nayyar

      Saryu Nayyar

      CEO of Gurucul

  4. Hacking the UK Election

    Could a state, hacktivist group or criminal gang influence the outcome of the election?

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  5. Pursuing Cyber-Criminals with Cyber-Tracing

    Once a cyber-attack or incident is contained, a potential next step is to seek recourse against the wrongdoer.

    1. Photo of Helen Davenport

      Helen Davenport

      Director at Gowling WLG

  6. Get the Most Value from your Spam

    A lot of information can be gathered from spam to influence mitigation research.

    1. Photo of Larry Cashdollar

      Larry Cashdollar

      Senior Security Response Engineer, Akamai

  7. Why Two Factors are Better than One

    Two factors are better than one in the security authentication landscape.

    1. Photo of Brett Bogan

      Brett Bogan

      Director Investigations Information Assurance and Data Protection, RELX Group

    2. Photo of Darrell Owens

      Darrell Owens

      Senior Security Planning Consultant Information Assurance and Data Protection, RELX Group

  8. What the Government Can Offer British Cybersecurity

    There is no question that the uptake of Government resources is disappointingly low

    1. Photo of Gordon Morrison

      Gordon Morrison

      Director Government Relations for McAfee UK

  9. Five Reasons Hackers are Targeting SMEs

    Five reasons hackers are targeting SMEs and what you can do to protect your business.

    1. Photo of Steve Nice

      Steve Nice

      Chief Security Technologist, Node4

  10. Who Benefits from the Backdoor in Technology?

    Governments want backdoors in encrypted communications, people want privacy, providers don't want to play ball - what's the solution?

  11. Fixating on the Kill Chain Model is Misleading

    CISOs must forget about preventing attacks and focus on dealing with the ones which have already breached their networks, argues Cyber adAPT CEO and President, Kirsten Bay.

    1. Photo of Kirsten Bay

      Kirsten Bay

      President and CEO, Cyber adAPT

  12. Please Mind the Complexity Gap

    How Effective Security Management Can Cover the Increasing Gap between Technology & Resources.

    1. Photo of Michael Callahan

      Michael Callahan

      VP, FireMon

  13. Key Factor in Cybersecurity Hiring: Skills, Certifications or Experience?

    Insights regarding prioritizing skills, certificates and experience.

    1. Photo of Domini  Clark

      Domini Clark

      Senior recruiter, Decision Toolbox

  14. Cybersecurity Governance: Transform Mediocrity into Excellence

    The responsibility for creating and maintaining an environment in which excellent security can flourish squarely in the C-Suite’s lap.

    1. Photo of Adrian Dain

      Adrian Dain

      Principal Consultant at Mason Advisory

  15. Sun Tzu's 'The Art of War' for Cybersecurity

    As warfare moves from the battlefield to the realm of cyber-space, its principles are being seen as especially applicable to cybersecurity.

    1. Tom Madsen

      Security Advisor, Fort Consult

  16. How to Prevent Hackers From Hijacking Memorial Day

    How not to fall victim to a hoax on Memorial Day, and the solutions to solve this.

    1. Photo of Hadar Blutrich

      Hadar Blutrich

      CTO, Source Defense

  17. The ‘Secrets’ of Robust Encryption

    It is no longer good enough to rely on compliance to ensure a company has deployed enough security defenses

    1. Photo of Andrew Alston

      Andrew Alston

      UK Director, Covata Europe

  18. WannaCry Exposed Organizations' Weakest Link: How we Make it Stronger

    While the true scale of the WannaCry epidemic has yet to be revealed, the cybersecurity industry should already be learning from the incident, to make sure it’s never repeated.

    1. Photo of Colin McTrusty

      Colin McTrusty

      Director of EMEA at Wombat Security

  19. How to Integrate Mobile Security into App Development

    While it’s recommended to benchmark your application for internal improvements, it is also very essential to perform security benchmarking against other programs

    1. Photo of Harnil Oza

      Harnil Oza

      CEO of Hyperlink Infosystem

  20. WannaCry: A Refreshing Attack

    $300 is just enough to get attention and make a point without inflicting financial damage.

    1. Photo of Evan Bundschuh

      Evan Bundschuh

      Vice president at GB&A

What’s hot on Infosecurity Magazine?