Infosecurity Opinions

  1. Training an Army of Cyber Defenders: The Case for Simulation

    Cultivating security experience through a framework of simulation training

    1. Photo of Adi Dar

      Adi Dar

      CEO of Cyberbit

  2. Coming to Terms with the Snooper's Charter

    ISPA exists and unless attempts to amend it are successful, those of us working in the IT sector will need to comply with it.

    1. Photo of Richard  Whomes

      Richard Whomes

      Senior Director, Rocket Software

  3. A Reversed Approach to Tackling Insider Threats

    By looking inwards – including continual monitoring of their internal networks and accumulated logs – organizations have fundamentally changed (and reversed) the age-old security mantra of defence.

  4. How to Boost Your Information Security When Outsourcing

    The possible ways of avoiding the main pitfalls in terms of protecting sensitive information.

    1. Photo of Sergiy  Korniyenko

      Sergiy Korniyenko

      COO of Agiliway

  5. The First Step to Uncovering Cryptography

    As cryptography becomes increasingly complicated and perhaps gradually more unintelligible for humans (especially as we hand it over to AI), understanding the precepts of security and cryptography is essential to all businesses, especially those that provide internet services or store customer data in internet-based systems.

    1. Photo of Jonathan Jenkyn

      Jonathan Jenkyn

      Security Practice Lead, KCOM

  6. Video Game Security: The Future Belongs to Machines

    Machine learning isn’t the solution to all of the problems in video game security, but it can take us a long way towards our goals.

    1. Photo of Brian Godsey

      Brian Godsey

      Chief Data Scientist at Panopticon Labs

  7. The Challenges of Minimizing Data Security Risks

    Software as a service (SaaS) is more and more becoming interesting to small and medium-sized businesses as a great solution to their IT needs.

    1. Photo of Jorge Sagastume

      Jorge Sagastume

      Vice President at EscrowTech International

  8. Ransomware and Cyber-Insurance: What It Means for You and Your Company

    If you’re one of the approximately one third of U.S. companies that purchase cyber-insurance to mitigate the costs of a security breach, you may be covered for a ransomware attack. But policies can vary greatly, and it’s important that companies understand the specifics.

    1. Photo of Samit Shah

      Samit Shah

      Insurance Solutions Manager at BitSigh

  9. How Machines are Waging War Against the Malicious Insider

    There is a savior in sight and machine learning is gaining momentum and catching up with the sophisticated, malicious insider at a rapid pace.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  10. Treating Ransomware in the Healthcare Sector

    Ransomware is a serious problem across all industries, but increasingly the healthcare sector has become a primary focus for cyber criminals who are keen to capitalize on this sector’s need to run a 24/7/365 operation.

    1. Photo of Peter Groucutt

      Peter Groucutt

      Managing Director at Databarracks

  11. How to Guarantee Data Security When Data is in an External or Public Cloud

    There's no doubt that shared cloud hosting offers many direct advantages to businesses, particularly those without extensive on-site data infrastructure. It's inexpensive, it's easy to access, it doesn't require maintaining your own hardware, and you've got experts on-call if there's ever an issue.

    1. Photo of John Ciarlone

      John Ciarlone

      VP Sales & Marketing, Hummingbird Networks

  12. Security Breaches are Inevitable...Or Are They?

    While exciting, new dynamics are accompanied by potentially catastrophic security implications and presents enterprise organizations with the significant challenge of balancing security with user privacy.

    1. Photo of Christy Wyatt

      Christy Wyatt

      CEO, Dtex Systems

  13. Cloud Data Remains Your Responsibility

    It is the cloud provider’s responsibility to ensure your data is secured and protected within their environment, and their SLA should offer appropriate guarantees.

    1. Photo of Richard Blanford

      Richard Blanford

      Managing Director, Fordway

  14. Decipher your Encryption Challenges

    Why centralised encryption management is here to stay.

    1. Photo of Mark Hickman

      Mark Hickman

      Chief Operating Officer of WinMagic

  15. Gmail Phishing: Is it Time to Block Uncategorized Sites?

    The recent reports warning users about a phishing attack that’s been targeting Gmail users with a high degree of effectiveness have caught the attention of security professionals, but the attack should in fact pose little risk to many enterprise users.

    1. Photo of Elad Menahem

      Elad Menahem

      Head of Security Research, Cato Networks

  16. Detecting the Undetectable

    How CISOs can hunt for the attackers who don’t want to be found

    1. Mike Turner

      Global Cybersecurity Business Leader, Capgemini

  17. Time for Operators to Act on Mobile Security

    Why carriers should build enhanced security features into their mobile services

    1. Photo of Keith O'Byrne

      Keith O'Byrne

      Head of Solutions, Asavie

  18. How The Industry Responds to the Cybersecurity Skills Shortage

    To hear that the Government is setting aside significant investment to teach teenagers vital cybersecurity skills is welcome news, especially at a time when there is a serious lack of digital skills and an increased threat to companies’ digital infrastructures.

    1. Photo of Jonathan Martin

      Jonathan Martin

      Cyber Security & Cloud Department Manager, Networkers

  19. How to Spot Rogue Admins in Your Company

    Most administrators are likely to be honest, hard-working and reliable workers, although some have been known to turn to the dark side. Why? It's hard to say.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  20. Users Can Secure Their IoT Devices; But Will They?

    Attackers use malware to enlist our smart thermostats, speakers, lights, and more as soldiers for their botnet armies – used in coordinated massive attacks causing security breaches that threaten the integrity of the internet.

    1. Photo of Jeff Finn

      Jeff Finn

      CEO of Zvelo

What’s hot on Infosecurity Magazine?