Infosecurity Opinions

  1. Keeping Today’s 'Smart Office' Secure

    The internet today barely resembles the one from 15 years ago that gave birth to browsers, online research and Cyber Monday, and it continues to change on a daily basis

    1. Photo of Vinay Anand

      Vinay Anand

      Vice-president of ClearPass Security at Aruba

  2. Workers Mix Business with Pleasure & the Security Impact is Colossal

    Scott Millis, CTO, Cyber adAPT, warns that the growing trend of using a single device for all professional and personal interactions is causing huge headaches for security teams

    1. Photo of Scott Millis

      Scott Millis

      CTO, Cyber adAPT

  3. Cybersecurity – Just Like Sex, Drugs & Rock ‘n’ Roll

    Just like sex, drugs & rock ‘n’ roll – we have to adapt our own behavior to get all of the benefits and minimize the chance of short, medium or long-term damage

    1. Photo of Ian  Kayne

      Ian Kayne

      Cybersecurity Practice Lead at Mason Advisory

  4. The Five Stages of Compliance Audit Grief

    Any psychotherapist will tell you there are a range of mind states adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a compliance audit. The good news? You will get through it

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  5. The Why and How of Ransomware

    Ransomware is undeniably becoming one of the biggest threats facing businesses today

    1. Photo of Matt Middleton-Leal

      Matt Middleton-Leal

      EMEA & APAC General Manager at Netwrix

  6. Tools of the Trade: Browsing Through the Hack Store

    By learning how to use free or low-cost downloadable and widely available tools, hackers can empower themselves over just about any mobile or desktop device, as well as over supposedly secure on-line network

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  7. Important Tips for Updating Your Breach Response Plan

    Dan Sarel, co-founder and VP of product management at Demisto, explores the importance of having an effective breach response plan

    1. Dan Sarel

      Co-founder and VP of Product Management, Demisto

  8. An Information Security Survival Guide

    Shred-it's Andrew Lenardon walks through the fives steps to a culture of security

    1. Photo of Andrew Lenardon

      Andrew Lenardon

      Global Accounts Director, Shred-it

  9. Four Applications You Should Blacklist Today

    It is important that companies take a proactive approach to blacklisting and removing high-risk applications or applications that have entered end-of-life

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  10. Noisy Fans & Fake Deli Coupons: How Hackers are Winning Now

    In the race to come up with new and more sophisticated ways to invade victims' computers and networks, hackers will use any means necessary – even a computer's fan

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  11. Protect Your Enterprise by Balancing WordPress Plugins

    SiteLock President Neill Feather and Crowd Favorite CEO Karim Marucchi outline what enterprises should consider in order to protect themselves from exposure via WordPress, mitigate cyber risks, and still ensure a pleasant online user experience

    1. Photo of Neill  Feather

      Neill Feather

      President, SiteLock

    2. Photo of Karim  Marucchi

      Karim Marucchi

      CEO, Crowd Favorite

  12. Preventing Privileged Account Abuse

    Fraud or theft that occurs as a result of privileged account abuse is one of the most challenging for organizations to identify

    1. Photo of Balázs   Scheidler

      Balázs Scheidler

      Co-founder and CTO, Balabit

  13. Edge Computing & Security: Rethinking Compliance & Data Protection in a Mobile-First Environment

    IT today is no longer solely linked to specific machines sitting on desks; the growth of mobile and remote working means that users have more options on what devices they use, how they use them and where they get work done

    1. Photo of Andrew Nielsen

      Andrew Nielsen

      Director of Enterprise Security, Druva

  14. How Can We Achieve 50/50 Gender Parity in Cybersecurity?

    Lucy Chaplin, associate of (ISC)², manager at KPMG, on how the company tackled the gender gap in security

    1. Photo of Lucy Chaplin

      Lucy Chaplin

      Associate of (ISC)², Manager at KPMG

  15. The Cyber Cold War: the Newest Front in Political & Corporate Espionage

    The days of spies looking to get their hands on state and trade secrets are still alive and well today - except, now they’re digital

    1. Photo of Steven Malone

      Steven Malone

      Director of Security Product Management, Mimecast

  16. The Changing Role of the ISP & How Net Neutrality Laws Impact Cyber Defense

    Net neutrality is one of the internet’s guiding principles. The concept that Internet Service Providers (ISP) should direct all content and traffic from one destination to another, without passing judgment about the content, is widely recognized as the best means to preserve free speech online and encourage economic growth

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  17. Think People First when Improving Cybersecurity Posture

    Cybersecurity remains a frequent topic of discussion throughout many enterprises due to high-profile breaches

    1. Photo of Dotan Bar Noy

      Dotan Bar Noy

      CEO at ReSec Technologies

  18. The Pros and Cons of DNS Encryption

    The way governments deal with cybersecurity monitoring has never been more at the forefront of industry discussions, particularly with ongoing debate in the UK around the Investigatory Powers Bill raising the question of how – and if – governments should monitor data transmissions

    1. Photo of Rod Rasmussen

      Rod Rasmussen

      Vice-President, Cybersecurity, Infoblox

  19. The Four Cybersecurity Terms Businesses Need to Know

    Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind

    1. Photo of Monzy Merza

      Monzy Merza

      Director of cyber research, Splunk

  20. The Four Steps to AppSec in the Age of Dynamic Language Processing

    With more and more companies moving to the cloud to run their businesses, the pressure on developers to push out web applications at a rapid pace is continuing to grow

    1. Photo of Mike Milner

      Mike Milner

      Co-Founder and CTO, IMMUNIO

What’s hot on Infosecurity Magazine?