Infosecurity Opinions

  1. Driving a Culture of Security - Tips For The CIO

    Combating the cybersecurity skills gap both in terms of recruiting quality talent and employee awareness continues to be a top concern for the board.

    1. Photo of Julian Wragg

      Julian Wragg

      VP EMEA & APAC at Pluralsight

  2. Open Season: How Phishing Attacks Up Their Game

    Are we now more fallible to phishing? Phishing emails certainly used to be easy to spot.

    1. Photo of Steve Lamb

      Steve Lamb

      Technical Director, EMEA at Cipher

  3. GDPR: Innovation Deterrent or Incentive?

    Since GDPR was originally proposed by the European Commission in 2012, criticisms of the new regulation have been far-ranging.

    1. Photo of Lakshmi  Randall

      Lakshmi Randall

      Director of Product Marketing at Denodo

  4. Profiling The Insider Threat - Breaking Down a Complex Security Term

    Identifying five insider threat profiles to show the complexity of the problem.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  5. Darkonomics 101: The Underground Market for PII

    PII can yield serious consequences for its original owners while providing handsome pay-outs to cyber-criminals.

    1. Photo of Vitali Kremez

      Vitali Kremez

      Director of Research at Flashpoint

  6. A Data-Driven Approach to Security Decision Making

    Containers are an unstoppable force of disruption, replacing virtual machines by the dozens. Yet, containers have a far larger attack surface than virtual machines.

    1. Photo of Stefano Stabellini

      Stefano Stabellini

      ‎Virtualization Architect at Aporeto

  7. A Measured Incident Response

    Understanding the nature and extent of the cybersecurity incident is critical for successful eradication.

    1. Photo of Gemma Moore

      Gemma Moore

      Director, Cyberis

  8. I Spy: A Clear and Present Inside Danger

    Today, satisfied or disgruntled employee, your colleague, or even your boss can pilfer data.

    1. Photo of Rick Orloff

      Rick Orloff

      CSO at Code42

  9. It's Time to Speak in the Language of Risk

    Considering cybersecurity professionals came from this deeply rooted, technology-focused place, shifting to speaking risk is almost like learning a foreign language. So how can they make the transition as smooth and seamless a possible?

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  10. Frequency and Trends with Benefits

    Rigorous reporting that includes insights into frequency and trends will show if they are working properly and being effectively managed.

    1. Photo of Adrian Dain

      Adrian Dain

      Principal Consultant at Mason Advisory

  11. Overcoming the Rise of IoT-Based Botnets

    Mirai turned out to be the perfect catalyst for harnessing more CPU and bandwidth from the most unassuming devices on a massive scale.

    1. Photo of Alex Cruz-Farmer

      Alex Cruz-Farmer

      VP Cloud Services at, NSFOCUS

  12. Advanced Malware Detection - Signatures vs. Behavior Analysis

    Both signature and behavior-based malware detection are important and have advantages. The best security will come from utilizing both technologies.

    1. John Cloonan

      Director of Products, Lastline

  13. How to Measure the Effectiveness of Security Programs

    Organizations struggle to understand how to measure the return on investment. This often results in employing point technologies without considering the complexity of integrating into existing systems, or relying on traditional security controls that are out of date and processes that have not adapted to the changing threat landscape.

    1. Ben Chant

      Market Insights Manager, NTT Ltd

  14. Applying Military Protocol to Cybersecurity Best Practices

    The majority of protection systems rely on passwords. If a hacker manages to get hold of one via a phishing exploit the rest is history.

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  15. 2016 Year of the Mega-Breach, More to Come?

    With over 4 billion records leaked last year, 2016 was a record-breaking year for data security. A look at the key findings and takeaways of the recently published IBM X-Force Threat Intelligence Index.

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  16. Prevent Your Most Secure System from Becoming Your Achilles Heel

    All over the world, the biggest banks, insurance companies, telcos, and other private enterprises store the majority of their most critical and sensitive customer data and intellectual property on the mainframe. The reason is simple; the mainframe remains the most secure system around.

    1. Photo of John Crossno

      John Crossno

      Product Manager, Compuware’s Security Solutions

  17. Hello IoT, Goodbye Security Innocence

    What does IoT mean for service providers and what can they do to get ready and future-proof both profit and innovation?

    1. Photo of Bernd Kunze

      Bernd Kunze

      Solutions Architect, F5 Networks

  18. Brakes and Breaches: Why the Board Treats Them the Same

    A precedent exists to fire, or significantly cut the compensation of, the chief executives in charge of either brake failures or security breaches.

    1. Photo of Anne-Marie Chun

      Anne-Marie Chun

      Industry Analyst, Synack

  19. Phishing - Why We Keep Getting Netted

    While some individuals may be practicing cyber safety online, phishing is still one of the most powerful and persistent forms of cyber-attack going.

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

  20. Strengthening Authentication Measures for Enhanced Mobile Security

    Great authentication measures are still prone to thievery.

    1. Photo of Juned Ghanchi

      Juned Ghanchi

      Co-Founder of IndianAppDevelopers

What’s hot on Infosecurity Magazine?