Infosecurity Opinions

  1. 2016 Year of the Mega-Breach, More to Come?

    With over 4 billion records leaked last year, 2016 was a record-breaking year for data security. A look at the key findings and takeaways of the recently published IBM X-Force Threat Intelligence Index.

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  2. Prevent Your Most Secure System from Becoming Your Achilles Heel

    All over the world, the biggest banks, insurance companies, telcos, and other private enterprises store the majority of their most critical and sensitive customer data and intellectual property on the mainframe. The reason is simple; the mainframe remains the most secure system around.

    1. Photo of John Crossno

      John Crossno

      Product Manager, Compuware’s Security Solutions

  3. Hello IoT, Goodbye Security Innocence

    What does IoT mean for service providers and what can they do to get ready and future-proof both profit and innovation?

    1. Photo of Bernd Kunze

      Bernd Kunze

      Solutions Architect, F5 Networks

  4. Brakes and Breaches: Why the Board Treats Them the Same

    A precedent exists to fire, or significantly cut the compensation of, the chief executives in charge of either brake failures or security breaches.

    1. Photo of Anne-Marie Chun

      Anne-Marie Chun

      Industry Analyst, Synack

  5. Phishing - Why We Keep Getting Netted

    While some individuals may be practicing cyber safety online, phishing is still one of the most powerful and persistent forms of cyber-attack going.

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

  6. Strengthening Authentication Measures for Enhanced Mobile Security

    Great authentication measures are still prone to thievery.

    1. Photo of Juned Ghanchi

      Juned Ghanchi

      Co-Founder of IndianAppDevelopers

  7. Towards More Enterprise Security for IoT

    Which standards are needed to ensure IoT can be used in enterprise security.

    1. Photo of Issam Dalati

      Issam Dalati

      IT Security Consultant

  8. Cyber-Threat and Regulation Priorities for CISOs

    Future CISO priorities include dealing with DDoS, GDPR, and third-party threats.

    1. Photo of Jake Summerfield

      Jake Summerfield

      Managing Director, Network Group Events

  9. Is your Cloud Governance Agility Enough to Keep up with DevOps?

    Agility rules when it comes to DevOps, yet cloud governance models follow structured methods.

    1. Photo of Chris Gervais

      Chris Gervais

      VP of Engineering, Threat Stack

  10. History Repeating: Top Five Database Threats

    It might be time for some organizations to get back to the basics when it comes to database security: best practices, internal controls, and database security solutions.

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  11. Critical Takeaways from WikiLeaks 'Vault 7' Release

    Three particularly critical cybersecurity issues that the WikiLeaks release brings into stark focus.

    1. Photo of Patrick Dennis

      Patrick Dennis

      President and CEO, Guidance Software

  12. The Secret to Winning the War for Security Talent

    Hiring the right security staff is the most critical for managing risk.

    1. Photo of Jeremy Bergsman

      Jeremy Bergsman

      Practice Manager, CEB

    2. Photo of Daria Kirilenko

      Daria Kirilenko

      Research consultant at CEB

  13. The Data Centre as a Time Machine

    Yet to realize the potential impact of digitization, we need to help businesses get to grips with the reality of the cybersecurity threat landscape we now find ourselves in.

    1. Photo of Terry  Greer-King

      Terry Greer-King

      Director of Cybersecurity, Cisco

  14. Enterprise Security for the Home

    The arrival of the IOT era means it is time that Internet security is taken more seriously by everyone and that the answer is to introduce enterprise-class systems and controls to protect home networks.

    1. Photo of Simon Wesseldine

      Simon Wesseldine

      CSO of Idappcom

  15. Measure ROI of Phishing Awareness and Education Training

    While employees are often considered the front line of protection, they’re also the individuals most likely to voluntarily turn over information.

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  16. Five Questions Board Members Should Ask Their CISO

    Security isn’t something that can just be swept under the rug while the board and executive team plans on just pointing figures if something bad happens

    1. Photo of Ernesto DiGiambattista

      Ernesto DiGiambattista

      CEO and Founder of Cybric

  17. How to Defuse the BYOD Bomb Without Going Nuclear

    For many organizations, there is another more practical way to subdue the BYOD goliath without killing off all employee freedom to use preferred devices for work.

    1. Photo of Adrian Dain

      Adrian Dain

      Principal Consultant at Mason Advisory

  18. Collaboration is the Key to Effective Cyber-defense

    Every year, cybersecurity rises up the business agenda. Today, putting the right protection and protocols in place to defend against growing cyber-risks is front of mind for boardrooms around the world

    1. Photo of Richard  Wilding

      Richard Wilding

      Director of New Ventures, BAE Systems Applied Intelligence

  19. Security Priorities and Multi-Cloud Migration - What to Secure First

    Securing, patching and isolating the cloud workload should be the first priorities.

    1. Photo of Oliver Pinson-Roxbrough

      Oliver Pinson-Roxbrough

      EMEA director at Alert Logic

  20. How to Assemble a Solid Security Team

    What does an ideal group look like? It draws from several functions and departments—the C-suite, legal, human resources, information technology, and, of course, security.

    1. Photo of David Green

      David Green

      chief security officer of Veriato

What’s hot on Infosecurity Magazine?