Infosecurity Opinions

  1. How to Hold on to Your Workforce During the Job Hunting Season

    Losing employees can pose a serious organizational challenge. With the cost of employee turnover estimated to be as much as 1.5 to 2 times an employee’s salary, how can companies retain their workforce and protect their bottom lines?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  2. Web Isolation: The Evolution of Enterprise-Ready Isolation

    Isolation is based on the concept of creating an “air-gap” between the web and users, to eliminate the possibility of threats reaching and infecting devices.

    1. Photo of Guy Guzner

      Guy Guzner

      CEO & Co-Founder of Fireglass

  3. Cybersecurity in 2017: Recruitment is Key

    As the cost and frequency of breaches continue to increase, companies are learning the value in investing in the improvement their cybersecurity systems.

    1. Photo of Faith MacAnas

      Faith MacAnas

      Technology Writer

  4. Why Containerisation Matters More Than Ever Before

    As organizations mobilize, they cannot afford to compromise corporate security: yet mobility is in a constant state of flux, with new innovations in communication, collaboration and productivity-enhancing technology continuing to disrupt and confound conventional security practices.

    1. Photo of Mark Carlile

      Mark Carlile

      Senior Director, Enterprise Sales, UK, ME & SA at Blackberry

  5. How to Outsource Security Services: Tips for Small Businesses

    Considering the sophisticated cyber-attacks which SMBs may face, it’s not particularly practical to form an IT team to monitor the network and keep an eye on regular employees’ activities.

    1. Photo of Yana Yelina

      Yana Yelina

      Website design and development expert at EffectiveSoft

  6. Cyber Insurance: Coming of Age in 2017?

    As large-scale attacks and disclosures of massive data-breaches were reoccurring along the year, we realized once again that allocating tremendous efforts and resources to your cybersecurity defense does not provide any guarantee you won’t experience an incident.

    1. Photo of Yakir Golan

      Yakir Golan

      CEO and co-founder of Kovrr

  7. The Fog of the Cybersecurity Challenge

    Gearing an educational system to train workers at a rate ten times the current levels currently achieved by colleges and universities, and in just three years, does seem a massive challenge!

    1. Photo of Alastair MacWillson

      Alastair MacWillson

      Chair of the IISP

  8. Want Stronger Network Security? Pay Attention to Your Packets

    We are facing a crime scene built from a complex structure of servers, networks and applications, scattered across many different geographical locations

    1. Photo of Peter Ekner

      Peter Ekner

      Chief Technical Officer, Napatech

  9. Securing the Connected Car

    Often dubbed a “data center on wheels,” the connected car is one of the fastest-growing markets in the ecosystem that makes up the Internet of Things (IoT).

    1. Photo of Shaun  Kirby

      Shaun Kirby

      Director, Automotive & Connected Car

  10. Advancing Infosecurity Standards Through Consensus

    As a collaborative process, consensus is designed to satisfy a wide group through inclusion, information and participation.

    1. Photo of Mark Ace

      Mark Ace

      President of Kavi

  11. How to Encourage Employees to Not Only Practice, but Actually Promote Cybersecurity Awareness

    How to Encourage Employees to Not Only Practice, But Actually Promote Cybersecurity Awareness

    1. Photo of Adam Godfrey

      Adam Godfrey

      Cybersecurity Policy and Compliance Consultant

  12. The Connected World: ‘With Great Power Comes Great Responsibility’

    The connected world becomes more and more embedded in the way we function, play and work.

    1. Photo of Ian  Kayne

      Ian Kayne

      Cybersecurity Practice Lead at Mason Advisory

  13. IoT Denial of Service Botnets and SCADA Attacks to Plague 2017

    With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead

    1. Photo of Liviu  Arsene

      Liviu Arsene

      Senior E-Threat Analyst, Bitdefender

  14. What is the Real Cost of DNS Security Attacks to UK Business?

    Around 20 percent of businesses have been subject to cache poisoning (data corruption) in the past 12 months – more than US organizations, along with a higher amount of DNS Amplification attacks.

    1. Photo of David Williamson

      David Williamson

      CEO at EfficientIP

  15. Porn Gets Pwned: for Hackers, XXX Means Exploit, Extort and Expose

    The xHamster breach is the latest in a string of compromises involving adult websites, including Ashley Madison, FriendFinder, Brazzers and Pornhub. Hackers may be targeting these sites not simply because of their lacklustre security, but because the sensitive information they house can be easily monetized via blackmail.

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  16. How will Mirai Emerge in 2017?

    Although a certain level of technical capability is required to install and operate Mirai, it has the potential to act as a force multiplier for a range of actors engaging in DDoS attacks, including hacktivists, extortionists, and politically-inspired actors.

    1. Photo of Michael Marriott

      Michael Marriott

      Research Analyst, Digital Shadows

  17. How to Build a Culture of Cybersecurity

    In spite of the highest levels of management insisting that it is a priority to protect data, why is it that some of us take those enabling actions? Why isn't everyone on board with cybersecurity?

    1. Photo of Steve  Sheck

      Steve Sheck

      Solutions Research Analyst, Optiv Security

  18. Failing to Prepare is Preparing to Fail with Network Security

    What, though, can companies do to help ensure that they are protected against enormously damaging breaches? A look at how organizations can help ensure their networks, sensitive data and other critical infrastructure are safeguarded from the huge number of threats now in play.

    1. Photo of Mav Turner

      Mav Turner

      Director, IT Security Business, SolarWinds

  19. Raising the Stakes: Serious Cyber Security Preparations for 2017

    The four trends, according to the ISF, that will shape the world of cybersecurity in 2017.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  20. The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

    Quantifying the financial impact of a data breach before it occurs is like assuming you can win roulette using insider trading

    1. Photo of MacKenzie Brown

      MacKenzie Brown

      Research Principal at Optiv

What’s hot on Infosecurity Magazine?