Infosecurity Opinions

  1. The Password is Alive But Not Well

    Passwords will remain the ubiquitous form of authentication. We should focus on making them better, not replacing them.

    1. Photo of Barry Shelton

      Barry Shelton

      Intellectual Property Lawyer, Pillsbury Law

  2. Infosec Budget: Creating Barriers to a Cybersecurity Culture

    Rather than working out how to spend whatever is in the budget, the challenge is how to get the right amount of budget allocated in the first place.

    1. Photo of Ian  Kayne

      Ian Kayne

      Cybersecurity Practice Lead at Mason Advisory

  3. Ensuring Secure Practices around Open Source

    Most companies remain in the dark when it comes to the open source used in their applications, and as a result are susceptible to vulnerabilities that may be in that open source.

    1. Photo of Patrick Carey

      Patrick Carey

      Director Product Marketing, Black Duck Software

  4. Endpoint Modeling: Automatic, Noise-Free Security

    Endpoint modeling automatically discovers each device that is on your network; creates a software-based model of that device’s usual behavior; continuously monitors the behavior of the device over time, identifies any deviations from the model; and when an exception occurs, generates a near-real-time, actionable alert for your security analyst(s), so that your organization can respond to a potential threat.

    1. Photo of Patrick Crowley

      Patrick Crowley

      Founder and CTO, Observable Networks

  5. What Executives and Board Members Should Demand of Security

    The question to ask should be: is there an active attacker currently on our network? The answer should be definitive and based on full visibility that detects attacker activity, namely the internal reconnaissance and lateral movement necessary to carry out an active attack

    1. Photo of Alex Moyes

      Alex Moyes

      UK Country Manager, LightCyber

  6. Automation in Phishing: Fighting One Automated Industry with Another

    As the phishing field continues to become more sophisticated, a larger abundance of advanced tools will become available for cyber-criminal to ensure their campaigns’ success.

    1. Photo of Yuri Shoshan

      Yuri Shoshan

      CEO of ReSec

  7. The Three Innovations Shaping Cybersecurity's Future

    Adaptive security continues to be a strategic technology trend for enterprises who face sophisticated cyber-attacks that force them to play constant defense using a patchwork of security tools.

    1. Photo of Wei Lien Dang

      Wei Lien Dang

      VP of Product at StackRox

  8. A Big Problem for Small Business: Why Companies of All Sizes must be Cybercrime Savvy

    It'’s easy to understand why so many people assume cybercrime is something that only happens to big businesses.

    1. Photo of Sian John

      Sian John

      EMEA Chief Strategist, Symantec

  9. Three Cybersecurity Mistakes That Can Kill Your Business

    Underestimating the level of danger is a principle business mistake that can lead to cybersecurity risks piling up until eventually a devastating breach will happen

    1. Photo of Marcell Gogan

      Marcell Gogan

      Technology Writer

  10. Facing a Crisis of Cyber Confidence, Organizations Must Focus on Risk and Resilience

    Planning for resilient incident response in the aftermath of a breach is imperative. Traditional risk management is insufficient.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  11. Deciphering Email Insecurity

    Email insecurity threatens political campaigns, organizations and even elections.

    1. Photo of Mark Baugher

      Mark Baugher

      Principal Security Engineer at Greenwave Systems

  12. Corporate Board Responsibility - The Cyber Security Buck Stops Here

    Who is responsible for cybersecurity issues inside the business, and whom does the buck stop with?

    1. Photo of Greg Reber

      Greg Reber

      Founder and CEO of AsTech Consulting

  13. Why Are Organizations Failing to Report Cybercrime?

    Imagine what the cybercrime figures would look like if the remaining 46% had reported their attacks.

    1. Photo of Tony Rowan

      Tony Rowan

      Chief Security Consultant, SentinelOne

  14. Scaling the Data Mountain

    Data governance can help organizations protect their most important assets before data can be exposed or breached.

    1. Photo of Richard Stiennon

      Richard Stiennon

      Chief Strategy Officer at Blancco Technology Group

  15. Who is Responsible for Encryption Keys?

    Once the GDPR is in full force, there will be thousands more data privacy officers in Europe, tasked with protecting personally identifiable information as it moves within and beyond the organizational boundary.

    1. Photo of Richard Anstey

      Richard Anstey

      CTO EMEA, Intralinks

  16. A Trumped-Up Approach to the Borderless War on "the Cyber"

    What can we make of President Trump’s public statements on cybersecurity? Where will cybersecurity leadership come from and how will policy be shaped by the status quo and unforeseen foreign policy crises yet unimagined?

    1. Photo of John Dickson

      John Dickson

      Principal, Denim Group

  17. Why Cybersecurity Is More Important Now Than Ever

    Despite which side of the political aisle your ideas land on, there is little debate that cybersecurity continues to be a hot issue. However, the debate over how best to go about treating these threats swiftly and amicably rages on.

  18. Multi-Layer Security is Essential for Public Sector Networks

    Public sector networks are prime targets for cyber-attacks. From criminal gangs looking to exploit sensitive personal information to hackers with political agendas threatening national security, public sector organizations face some of the most dangerous cyber-threats.

    1. Photo of Karsten Geise

      Karsten Geise

      director of Ethernet global business development, ADVA Optical Networking

  19. Building Security Layers – of Software

    What can be done about major attack tactics in 2017?

    1. Photo of David Fearne

      David Fearne

      Technical Director, Arrow ECS

  20. UK Businesses Must Use the Apprenticeship Levy to Boost Cybersecurity Skills

    This is a massive opportunity for UK businesses to close their cyber skills gap. But what is the Apprenticeship Levy, and how will it revolutionise IT security?

    1. Photo of Stefano Capaldo

      Stefano Capaldo

      Managing Director, Firebrand Apprenticeships

What’s hot on Infosecurity Magazine?