Infosecurity Opinions

  1. Don’t Get Complacent About Ransomware

    When you live and breathe IT and information security, it is easy to forget that not everyone in your organization is on the same page.

    1. Photo of Bruce Penson

      Bruce Penson

      Managing Director, Pro Drive IT

  2. How to Automate Governance, Risk and Compliance

    Automating GRC systems is an effective way to implement a robust information security management system process whilst keeping costs low.

    1. Photo of David Lello

      David Lello

      Director of Burning Tree

  3. How to Quantify the Risk of an Insider Threat

    Almost 80% of employee fraud takes place in accounting, operations, sales, senior management, customer service, and purchasing.

    1. Photo of David Green

      David Green

      chief security officer of Veriato

  4. Phishing Simulations: Will They Cure Your Company's Susceptibility?

    The holy grail of information security behavior change is upon us. Or so “they” would have you believe.

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      VP Information Security Assurance & Data Protection RELX Group

    2. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  5. You’ve Got Email…Problems

    One of the most contentious elections in modern history is finally over. The candidates and their surrogates mercilessly attacked one another’s character and reputations, inflicting wounds that will take a long time to heal. But beyond the personal reputations that suffered, there was something else that took an incredible beating: email technology.

    1. Photo of John  Ackerly

      John Ackerly

      CEO and Co-Founder of Virtru

  6. Whaling 101 - What You Need to Know About CEO Fraud Email Attacks

    Have you ever received an email out of the blue advising your parcel has “experienced an exception” or alerting you that you’re due a refund from your phone company and asking you to click a link?

    1. Photo of Steven Malone

      Steven Malone

      Director of Security Product Management, Mimecast

  7. When the Boundary Isn’t Enough: Accelerating Discovery, Investigation and Response

    Depending on which study you are citing, anywhere between 50% and 95% of companies have already been breached.

    1. Photo of Noam Rosenfeld

      Noam Rosenfeld

      Senior Vice President Research and Development, Cyber Intelligence Solutions, Verint Systems

  8. A Glimpse into Database Scalability

    Database scalability refers to the ability of a database to scale based on the workload it is subjected to.

    1. Photo of Tony Branson

      Tony Branson

      Database Load Balancing Senior Analyst, ScaleArc

  9. Internal and External Ramifications of Leaked Board Strategies

    Looking at breach response and how to prepare against the prospect of bad news.

    1. Photo of Sandra  Fathi

      Sandra Fathi

      President and Founder of Affect

    2. Photo of Brian Stafford

      Brian Stafford

      Board Expert and CEO of Diligent

  10. IoT in the Home Requires a Complete Security Rethink

    We're entering exciting times. Burgeoning technologies that were once stuff of science fiction look soon to become ubiquitous and commonplace.

    1. Photo of Steven Boyd

      Steven Boyd

      Security Consultant, Researcher, Ethical Hacker and Freelance Writer

  11. How Can the NHS Protect Itself Against Cyber Attacks?

    It’s not easy to put a cost on cybersecurity breaches in healthcare

    1. Chris Welch

      Product Manager, RAPid, BridgeHead Software

  12. Internal & External Ramifications of Leaked Board Strategies

    Brian Stafford, board expert and CEO of Diligent, and Sandra Fathi, president and founder of Affect, respond to key questions that answer how to best protect board materials and what companies can do to prepare for future breaches

    1. Photo of Sandra  Fathi

      Sandra Fathi

      President and Founder of Affect

    2. Photo of Brian Stafford

      Brian Stafford

      Board Expert and CEO of Diligent

  13. What Role Does Privacy Play in Your Digital Transformation Strategy?

    There are two approaches that an organization can take to modernize digitally – ‘internal business process out’ or ‘customer experience in’

    1. Photo of Randy Lenaghan

      Randy Lenaghan

      Vice-President at Echoworx

  14. Stop and Think: Cybersecurity Best Practices for Black Friday and Cyber Monday

    Eight simple tips that all shoppers can benefit from as we approach the holiday season

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  15. What Does the Role of CISO Look Like in 2016?

    It is essential for CISOs and CIOs to continually advance their knowledge to stay ahead of the game

    1. Photo of Tammy  Moskites

      Tammy Moskites

      CIO and CISO, Venafi

  16. Keeping Today’s 'Smart Office' Secure

    The internet today barely resembles the one from 15 years ago that gave birth to browsers, online research and Cyber Monday, and it continues to change on a daily basis

    1. Photo of Vinay Anand

      Vinay Anand

      Vice-president of ClearPass Security at Aruba

  17. Workers Mix Business with Pleasure & the Security Impact is Colossal

    Scott Millis, CTO, Cyber adAPT, warns that the growing trend of using a single device for all professional and personal interactions is causing huge headaches for security teams

    1. Photo of Scott Millis

      Scott Millis

      CTO, Cyber adAPT

  18. Cybersecurity – Just Like Sex, Drugs & Rock ‘n’ Roll

    Just like sex, drugs & rock ‘n’ roll – we have to adapt our own behavior to get all of the benefits and minimize the chance of short, medium or long-term damage

    1. Photo of Ian  Kayne

      Ian Kayne

      Cybersecurity Practice Lead at Mason Advisory

  19. The Five Stages of Compliance Audit Grief

    Any psychotherapist will tell you there are a range of mind states adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a compliance audit. The good news? You will get through it

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  20. The Why and How of Ransomware

    Ransomware is undeniably becoming one of the biggest threats facing businesses today

    1. Photo of Matt Middleton-Leal

      Matt Middleton-Leal

      EMEA & APAC General Manager at Netwrix

What’s hot on Infosecurity Magazine?