Infosecurity Opinions

  1. Porn Gets Pwned: for Hackers, XXX Means Exploit, Extort and Expose

    The xHamster breach is the latest in a string of compromises involving adult websites, including Ashley Madison, FriendFinder, Brazzers and Pornhub. Hackers may be targeting these sites not simply because of their lacklustre security, but because the sensitive information they house can be easily monetized via blackmail.

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  2. How will Mirai Emerge in 2017?

    Although a certain level of technical capability is required to install and operate Mirai, it has the potential to act as a force multiplier for a range of actors engaging in DDoS attacks, including hacktivists, extortionists, and politically-inspired actors.

    1. Photo of Michael Marriott

      Michael Marriott

      Research Analyst, Digital Shadows

  3. How to Build a Culture of Cybersecurity

    In spite of the highest levels of management insisting that it is a priority to protect data, why is it that some of us take those enabling actions? Why isn't everyone on board with cybersecurity?

    1. Photo of Steve  Sheck

      Steve Sheck

      Solutions Research Analyst, Optiv Security

  4. Failing to Prepare is Preparing to Fail with Network Security

    What, though, can companies do to help ensure that they are protected against enormously damaging breaches? A look at how organizations can help ensure their networks, sensitive data and other critical infrastructure are safeguarded from the huge number of threats now in play.

    1. Photo of Mav Turner

      Mav Turner

      Director, IT Security Business, SolarWinds

  5. Raising the Stakes: Serious Cyber Security Preparations for 2017

    The four trends, according to the ISF, that will shape the world of cybersecurity in 2017.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  6. The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

    Quantifying the financial impact of a data breach before it occurs is like assuming you can win roulette using insider trading

    1. Photo of MacKenzie Brown

      MacKenzie Brown

      Research Principal at Optiv

  7. Password Alternatives: How to Secure your Enterprise's Data

    There are two challenges with consumer security awareness — or lack of security awareness — that IT professionals need to take into account with passwords.

    1. Photo of Gur Shatz

      Gur Shatz

      Chief Technology Officer, Cato Networks

  8. Spoiler Alert: How Better Access Management and File Auditing Could Change Hollywood History

    Gone are the days when hackers are represented as anti-social nerds in dark rooms furiously tapping on their keyboards.

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  9. Fighting Fire with Fire – AI, Cyber Security, and Roles of the Future

    Artificial Intelligence (AI) as a subject has been around for years, however it is only now that AI as a real possibility is bleeding into public consciousness.

    1. Photo of Eldar Tuvey

      Eldar Tuvey

      co-founder and CEO, Wandera

  10. How Security by Design can Boost Business Agility

    However, with a fixed set of resources and a constrained capacity to deliver on new projects, IT is often accused of holding the business back rather than enabling it.

    1. Photo of Kevin Paige

      Kevin Paige

      Head of Information Security and Compliance, MuleSoft

  11. Hygiene First, Turbo-Powered Cyber Machine-Learning Predictive Analytics Ninjas Second

    CISOs often find that they don’t have good visibility into the state of hygiene across their estate. Yet when they do start digging, they find there’s a lot of gaps.

    1. Photo of Nik Whitfield

      Nik Whitfield

      chairman and founder, Panaseer

  12. Don’t Get Complacent About Ransomware

    When you live and breathe IT and information security, it is easy to forget that not everyone in your organization is on the same page.

    1. Photo of Bruce Penson

      Bruce Penson

      Managing Director, Pro Drive IT

  13. How to Automate Governance, Risk and Compliance

    Automating GRC systems is an effective way to implement a robust information security management system process whilst keeping costs low.

    1. Photo of David Lello

      David Lello

      Director of Burning Tree

  14. How to Quantify the Risk of an Insider Threat

    Almost 80% of employee fraud takes place in accounting, operations, sales, senior management, customer service, and purchasing.

    1. Photo of David Green

      David Green

      chief security officer of Veriato

  15. Phishing Simulations: Will They Cure Your Company's Susceptibility?

    The holy grail of information security behavior change is upon us. Or so “they” would have you believe.

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      VP Information Security Assurance & Data Protection RELX Group

    2. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  16. You’ve Got Email…Problems

    One of the most contentious elections in modern history is finally over. The candidates and their surrogates mercilessly attacked one another’s character and reputations, inflicting wounds that will take a long time to heal. But beyond the personal reputations that suffered, there was something else that took an incredible beating: email technology.

    1. Photo of John  Ackerly

      John Ackerly

      CEO and Co-Founder of Virtru

  17. Whaling 101 - What You Need to Know About CEO Fraud Email Attacks

    Have you ever received an email out of the blue advising your parcel has “experienced an exception” or alerting you that you’re due a refund from your phone company and asking you to click a link?

    1. Photo of Steven Malone

      Steven Malone

      Director of Security Product Management, Mimecast

  18. When the Boundary Isn’t Enough: Accelerating Discovery, Investigation and Response

    Depending on which study you are citing, anywhere between 50% and 95% of companies have already been breached.

    1. Photo of Noam Rosenfeld

      Noam Rosenfeld

      Senior Vice President Research and Development, Cyber Intelligence Solutions, Verint Systems

  19. A Glimpse into Database Scalability

    Database scalability refers to the ability of a database to scale based on the workload it is subjected to.

    1. Photo of Tony Branson

      Tony Branson

      Database Load Balancing Senior Analyst, ScaleArc

  20. Internal and External Ramifications of Leaked Board Strategies

    Looking at breach response and how to prepare against the prospect of bad news.

    1. Photo of Sandra  Fathi

      Sandra Fathi

      President and Founder of Affect

    2. Photo of Brian Stafford

      Brian Stafford

      Board Expert and CEO of Diligent

What’s hot on Infosecurity Magazine?