Infosecurity Opinions

  1. Deciphering Email Insecurity

    Email insecurity threatens political campaigns, organizations and even elections.

    1. Photo of Mark Baugher

      Mark Baugher

      Principal Security Engineer at Greenwave Systems

  2. Corporate Board Responsibility - The Cyber Security Buck Stops Here

    Who is responsible for cybersecurity issues inside the business, and whom does the buck stop with?

    1. Photo of Greg Reber

      Greg Reber

      Founder and CEO of AsTech Consulting

  3. Why Are Organizations Failing to Report Cybercrime?

    Imagine what the cybercrime figures would look like if the remaining 46% had reported their attacks.

    1. Photo of Tony Rowan

      Tony Rowan

      Chief Security Consultant, SentinelOne

  4. Scaling the Data Mountain

    Data governance can help organizations protect their most important assets before data can be exposed or breached.

    1. Photo of Richard Stiennon

      Richard Stiennon

      Chief Strategy Officer at Blancco Technology Group

  5. Who is Responsible for Encryption Keys?

    Once the GDPR is in full force, there will be thousands more data privacy officers in Europe, tasked with protecting personally identifiable information as it moves within and beyond the organizational boundary.

    1. Photo of Richard Anstey

      Richard Anstey

      CTO EMEA, Intralinks

  6. A Trumped-Up Approach to the Borderless War on "the Cyber"

    What can we make of President Trump’s public statements on cybersecurity? Where will cybersecurity leadership come from and how will policy be shaped by the status quo and unforeseen foreign policy crises yet unimagined?

    1. Photo of John Dickson

      John Dickson

      Principal, Denim Group

  7. Why Cybersecurity Is More Important Now Than Ever

    Despite which side of the political aisle your ideas land on, there is little debate that cybersecurity continues to be a hot issue. However, the debate over how best to go about treating these threats swiftly and amicably rages on.

  8. Multi-Layer Security is Essential for Public Sector Networks

    Public sector networks are prime targets for cyber-attacks. From criminal gangs looking to exploit sensitive personal information to hackers with political agendas threatening national security, public sector organizations face some of the most dangerous cyber-threats.

    1. Photo of Karsten Geise

      Karsten Geise

      director of Ethernet global business development, ADVA Optical Networking

  9. Building Security Layers – of Software

    What can be done about major attack tactics in 2017?

    1. Photo of David Fearne

      David Fearne

      Technical Director, Arrow ECS

  10. UK Businesses Must Use the Apprenticeship Levy to Boost Cybersecurity Skills

    This is a massive opportunity for UK businesses to close their cyber skills gap. But what is the Apprenticeship Levy, and how will it revolutionise IT security?

    1. Photo of Stefano Capaldo

      Stefano Capaldo

      Managing Director, Firebrand Apprenticeships

  11. How to Hold on to Your Workforce During the Job Hunting Season

    Losing employees can pose a serious organizational challenge. With the cost of employee turnover estimated to be as much as 1.5 to 2 times an employee’s salary, how can companies retain their workforce and protect their bottom lines?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  12. Web Isolation: The Evolution of Enterprise-Ready Isolation

    Isolation is based on the concept of creating an “air-gap” between the web and users, to eliminate the possibility of threats reaching and infecting devices.

    1. Photo of Guy Guzner

      Guy Guzner

      CEO & Co-Founder of Fireglass

  13. Cybersecurity in 2017: Recruitment is Key

    As the cost and frequency of breaches continue to increase, companies are learning the value in investing in the improvement their cybersecurity systems.

    1. Photo of Faith MacAnas

      Faith MacAnas

      Technology Writer

  14. Why Containerisation Matters More Than Ever Before

    As organizations mobilize, they cannot afford to compromise corporate security: yet mobility is in a constant state of flux, with new innovations in communication, collaboration and productivity-enhancing technology continuing to disrupt and confound conventional security practices.

    1. Photo of Mark Carlile

      Mark Carlile

      Senior Director, Enterprise Sales, UK, ME & SA at Blackberry

  15. How to Outsource Security Services: Tips for Small Businesses

    Considering the sophisticated cyber-attacks which SMBs may face, it’s not particularly practical to form an IT team to monitor the network and keep an eye on regular employees’ activities.

    1. Photo of Yana Yelina

      Yana Yelina

      Website design and development expert at EffectiveSoft

  16. Cyber Insurance: Coming of Age in 2017?

    As large-scale attacks and disclosures of massive data-breaches were reoccurring along the year, we realized once again that allocating tremendous efforts and resources to your cybersecurity defense does not provide any guarantee you won’t experience an incident.

    1. Photo of Yakir Golan

      Yakir Golan

      CEO and co-founder of Kovrr

  17. The Fog of the Cybersecurity Challenge

    Gearing an educational system to train workers at a rate ten times the current levels currently achieved by colleges and universities, and in just three years, does seem a massive challenge!

    1. Photo of Alastair MacWillson

      Alastair MacWillson

      Chair of the IISP

  18. Want Stronger Network Security? Pay Attention to Your Packets

    We are facing a crime scene built from a complex structure of servers, networks and applications, scattered across many different geographical locations

    1. Photo of Peter Ekner

      Peter Ekner

      Chief Technical Officer, Napatech

  19. Securing the Connected Car

    Often dubbed a “data center on wheels,” the connected car is one of the fastest-growing markets in the ecosystem that makes up the Internet of Things (IoT).

    1. Photo of Shaun  Kirby

      Shaun Kirby

      Director, Automotive & Connected Car

  20. Advancing Infosecurity Standards Through Consensus

    As a collaborative process, consensus is designed to satisfy a wide group through inclusion, information and participation.

    1. Photo of Mark Ace

      Mark Ace

      President of Kavi

What’s hot on Infosecurity Magazine?