Infosecurity Opinions

  1. Collaboration is the Key to Effective Cyber-defense

    Every year, cybersecurity rises up the business agenda. Today, putting the right protection and protocols in place to defend against growing cyber-risks is front of mind for boardrooms around the world

    1. Photo of Richard  Wilding

      Richard Wilding

      Director of New Ventures, BAE Systems Applied Intelligence

  2. Security Priorities and Multi-Cloud Migration - What to Secure First

    Securing, patching and isolating the cloud workload should be the first priorities.

    1. Photo of Oliver Pinson-Roxbrough

      Oliver Pinson-Roxbrough

      EMEA director at Alert Logic

  3. How to Assemble a Solid Security Team

    What does an ideal group look like? It draws from several functions and departments—the C-suite, legal, human resources, information technology, and, of course, security.

    1. Photo of David Green

      David Green

      chief security officer of Veriato

  4. SAML - The Vital Hidden Ingredient in Effective Single Sign-On

    SAML provides the capability for users to access resources from entirely separate domains using their own credentials.

    1. Photo of Lee Painter

      Lee Painter

      CEO of Hypersocket Software

  5. Iot Botnets are Coming, How Can You Escape Them?

    We probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of Minecraft gaming server providers.

    1. Photo of David Williamson

      David Williamson

      CEO at EfficientIP

  6. Standards and Security: The Great DDoS Challenge

    DDoS attacks are now moving towards more mission critical operations in hospitals, banks and universities.

    1. Sally Long

      Director of The Open Group Trusted Technology Forum, The Open Group

  7. Ransomware "Your Money, or your Data!"

    There may never be a cyber-silver bullet to protect you 100% of the time against these pervasive threats; those who claim they can, will inevitably face disappointed end users.

    1. Photo of Scott Millis

      Scott Millis

      CTO, Cyber adAPT

  8. A Growing Talent Shortfall Can Leave Apps Vulnerable

    The skills shortage will prove to be an unlikely cause of serious application security weaknesses and data theft in the coming years.

    1. Photo of John Matthew Holt

      John Matthew Holt

      Founder & CTO, Waratek

  9. From Data to Critical Infrastructure: Attackers Get Physical

    We’re no longer talking just about regulatory fines and reputational damage, but the possibility of actual physical harm.

    1. Photo of Chris Goettl

      Chris Goettl

      Product Manager, Ivanti

  10. Training an Army of Cyber Defenders: The Case for Simulation

    Cultivating security experience through a framework of simulation training

    1. Photo of Adi Dar

      Adi Dar

      CEO of Cyberbit

  11. Coming to Terms with the Snooper's Charter

    ISPA exists and unless attempts to amend it are successful, those of us working in the IT sector will need to comply with it.

    1. Photo of Richard  Whomes

      Richard Whomes

      Senior Director, Rocket Software

  12. A Reversed Approach to Tackling Insider Threats

    By looking inwards – including continual monitoring of their internal networks and accumulated logs – organizations have fundamentally changed (and reversed) the age-old security mantra of defence.

  13. How to Boost Your Information Security When Outsourcing

    The possible ways of avoiding the main pitfalls in terms of protecting sensitive information.

    1. Photo of Sergiy  Korniyenko

      Sergiy Korniyenko

      COO of Agiliway

  14. The First Step to Uncovering Cryptography

    As cryptography becomes increasingly complicated and perhaps gradually more unintelligible for humans (especially as we hand it over to AI), understanding the precepts of security and cryptography is essential to all businesses, especially those that provide internet services or store customer data in internet-based systems.

    1. Photo of Jonathan Jenkyn

      Jonathan Jenkyn

      Security Practice Lead, KCOM

  15. Video Game Security: The Future Belongs to Machines

    Machine learning isn’t the solution to all of the problems in video game security, but it can take us a long way towards our goals.

    1. Photo of Brian Godsey

      Brian Godsey

      Chief Data Scientist at Panopticon Labs

  16. The Challenges of Minimizing Data Security Risks

    Software as a service (SaaS) is more and more becoming interesting to small and medium-sized businesses as a great solution to their IT needs.

    1. Photo of Jorge Sagastume

      Jorge Sagastume

      Vice President at EscrowTech International

  17. Ransomware and Cyber-Insurance: What It Means for You and Your Company

    If you’re one of the approximately one third of U.S. companies that purchase cyber-insurance to mitigate the costs of a security breach, you may be covered for a ransomware attack. But policies can vary greatly, and it’s important that companies understand the specifics.

    1. Photo of Samit Shah

      Samit Shah

      Insurance Solutions Manager at BitSigh

  18. How Machines are Waging War Against the Malicious Insider

    There is a savior in sight and machine learning is gaining momentum and catching up with the sophisticated, malicious insider at a rapid pace.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  19. Treating Ransomware in the Healthcare Sector

    Ransomware is a serious problem across all industries, but increasingly the healthcare sector has become a primary focus for cyber criminals who are keen to capitalize on this sector’s need to run a 24/7/365 operation.

    1. Photo of Peter Groucutt

      Peter Groucutt

      Managing Director at Databarracks

  20. How to Guarantee Data Security When Data is in an External or Public Cloud

    There's no doubt that shared cloud hosting offers many direct advantages to businesses, particularly those without extensive on-site data infrastructure. It's inexpensive, it's easy to access, it doesn't require maintaining your own hardware, and you've got experts on-call if there's ever an issue.

    1. Photo of John Ciarlone

      John Ciarlone

      VP Sales & Marketing, Hummingbird Networks

What’s hot on Infosecurity Magazine?