Infosecurity Opinions

  1. SAML - The Vital Hidden Ingredient in Effective Single Sign-On

    SAML provides the capability for users to access resources from entirely separate domains using their own credentials.

    1. Photo of Lee Painter

      Lee Painter

      CEO of Hypersocket Software

  2. Iot Botnets are Coming, How Can You Escape Them?

    We probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of Minecraft gaming server providers.

    1. Photo of David Williamson

      David Williamson

      CEO at EfficientIP

  3. Standards and Security: The Great DDoS Challenge

    DDoS attacks are now moving towards more mission critical operations in hospitals, banks and universities.

    1. Sally Long

      Director of The Open Group Trusted Technology Forum, The Open Group

  4. Ransomware "Your Money, or your Data!"

    There may never be a cyber-silver bullet to protect you 100% of the time against these pervasive threats; those who claim they can, will inevitably face disappointed end users.

    1. Photo of Scott Millis

      Scott Millis

      CTO, Cyber adAPT

  5. A Growing Talent Shortfall Can Leave Apps Vulnerable

    The skills shortage will prove to be an unlikely cause of serious application security weaknesses and data theft in the coming years.

    1. Photo of John Matthew Holt

      John Matthew Holt

      Founder & CTO, Waratek

  6. From Data to Critical Infrastructure: Attackers Get Physical

    We’re no longer talking just about regulatory fines and reputational damage, but the possibility of actual physical harm.

    1. Photo of Chris Goettl

      Chris Goettl

      Product Manager, Ivanti

  7. Training an Army of Cyber Defenders: The Case for Simulation

    Cultivating security experience through a framework of simulation training

    1. Photo of Adi Dar

      Adi Dar

      CEO of Cyberbit

  8. Coming to Terms with the Snooper's Charter

    ISPA exists and unless attempts to amend it are successful, those of us working in the IT sector will need to comply with it.

    1. Photo of Richard  Whomes

      Richard Whomes

      Senior Director, Rocket Software

  9. A Reversed Approach to Tackling Insider Threats

    By looking inwards – including continual monitoring of their internal networks and accumulated logs – organizations have fundamentally changed (and reversed) the age-old security mantra of defence.

  10. How to Boost Your Information Security When Outsourcing

    The possible ways of avoiding the main pitfalls in terms of protecting sensitive information.

    1. Photo of Sergiy  Korniyenko

      Sergiy Korniyenko

      COO of Agiliway

  11. The First Step to Uncovering Cryptography

    As cryptography becomes increasingly complicated and perhaps gradually more unintelligible for humans (especially as we hand it over to AI), understanding the precepts of security and cryptography is essential to all businesses, especially those that provide internet services or store customer data in internet-based systems.

    1. Photo of Jonathan Jenkyn

      Jonathan Jenkyn

      Security Practice Lead, KCOM

  12. Video Game Security: The Future Belongs to Machines

    Machine learning isn’t the solution to all of the problems in video game security, but it can take us a long way towards our goals.

    1. Photo of Brian Godsey

      Brian Godsey

      Chief Data Scientist at Panopticon Labs

  13. The Challenges of Minimizing Data Security Risks

    Software as a service (SaaS) is more and more becoming interesting to small and medium-sized businesses as a great solution to their IT needs.

    1. Photo of Jorge Sagastume

      Jorge Sagastume

      Vice President at EscrowTech International

  14. Ransomware and Cyber-Insurance: What It Means for You and Your Company

    If you’re one of the approximately one third of U.S. companies that purchase cyber-insurance to mitigate the costs of a security breach, you may be covered for a ransomware attack. But policies can vary greatly, and it’s important that companies understand the specifics.

    1. Photo of Samit Shah

      Samit Shah

      Insurance Solutions Manager at BitSigh

  15. How Machines are Waging War Against the Malicious Insider

    There is a savior in sight and machine learning is gaining momentum and catching up with the sophisticated, malicious insider at a rapid pace.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  16. Treating Ransomware in the Healthcare Sector

    Ransomware is a serious problem across all industries, but increasingly the healthcare sector has become a primary focus for cyber criminals who are keen to capitalize on this sector’s need to run a 24/7/365 operation.

    1. Photo of Peter Groucutt

      Peter Groucutt

      Managing Director at Databarracks

  17. How to Guarantee Data Security When Data is in an External or Public Cloud

    There's no doubt that shared cloud hosting offers many direct advantages to businesses, particularly those without extensive on-site data infrastructure. It's inexpensive, it's easy to access, it doesn't require maintaining your own hardware, and you've got experts on-call if there's ever an issue.

    1. Photo of John Ciarlone

      John Ciarlone

      VP Sales & Marketing, Hummingbird Networks

  18. Security Breaches are Inevitable...Or Are They?

    While exciting, new dynamics are accompanied by potentially catastrophic security implications and presents enterprise organizations with the significant challenge of balancing security with user privacy.

    1. Photo of Christy Wyatt

      Christy Wyatt

      CEO, Dtex Systems

  19. Cloud Data Remains Your Responsibility

    It is the cloud provider’s responsibility to ensure your data is secured and protected within their environment, and their SLA should offer appropriate guarantees.

    1. Photo of Richard Blanford

      Richard Blanford

      Managing Director, Fordway

  20. Decipher your Encryption Challenges

    Why centralised encryption management is here to stay.

    1. Photo of Mark Hickman

      Mark Hickman

      Chief Operating Officer of WinMagic

What’s hot on Infosecurity Magazine?