Infosecurity Opinions

  1. When the Boundary Isn’t Enough: Accelerating Discovery, Investigation and Response

    Depending on which study you are citing, anywhere between 50% and 95% of companies have already been breached.

    1. Photo of Noam Rosenfeld

      Noam Rosenfeld

      Senior Vice President Research and Development, Cyber Intelligence Solutions, Verint Systems

  2. A Glimpse into Database Scalability

    Database scalability refers to the ability of a database to scale based on the workload it is subjected to.

    1. Photo of Tony Branson

      Tony Branson

      Database Load Balancing Senior Analyst, ScaleArc

  3. Internal and External Ramifications of Leaked Board Strategies

    Looking at breach response and how to prepare against the prospect of bad news.

    1. Photo of Sandra  Fathi

      Sandra Fathi

      President and Founder of Affect

    2. Photo of Brian Stafford

      Brian Stafford

      Board Expert and CEO of Diligent

  4. IoT in the Home Requires a Complete Security Rethink

    We're entering exciting times. Burgeoning technologies that were once stuff of science fiction look soon to become ubiquitous and commonplace.

    1. Photo of Steven Boyd

      Steven Boyd

      Security Consultant, Researcher, Ethical Hacker and Freelance Writer

  5. How Can the NHS Protect Itself Against Cyber Attacks?

    It’s not easy to put a cost on cybersecurity breaches in healthcare

    1. Chris Welch

      Product Manager, RAPid, BridgeHead Software

  6. Internal & External Ramifications of Leaked Board Strategies

    Brian Stafford, board expert and CEO of Diligent, and Sandra Fathi, president and founder of Affect, respond to key questions that answer how to best protect board materials and what companies can do to prepare for future breaches

    1. Photo of Sandra  Fathi

      Sandra Fathi

      President and Founder of Affect

    2. Photo of Brian Stafford

      Brian Stafford

      Board Expert and CEO of Diligent

  7. What Role Does Privacy Play in Your Digital Transformation Strategy?

    There are two approaches that an organization can take to modernize digitally – ‘internal business process out’ or ‘customer experience in’

    1. Photo of Randy Lenaghan

      Randy Lenaghan

      Vice-President at Echoworx

  8. Stop and Think: Cybersecurity Best Practices for Black Friday and Cyber Monday

    Eight simple tips that all shoppers can benefit from as we approach the holiday season

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  9. What Does the Role of CISO Look Like in 2016?

    It is essential for CISOs and CIOs to continually advance their knowledge to stay ahead of the game

    1. Photo of Tammy  Moskites

      Tammy Moskites

      CIO and CISO, Venafi

  10. Keeping Today’s 'Smart Office' Secure

    The internet today barely resembles the one from 15 years ago that gave birth to browsers, online research and Cyber Monday, and it continues to change on a daily basis

    1. Photo of Vinay Anand

      Vinay Anand

      Vice-president of ClearPass Security at Aruba

  11. Workers Mix Business with Pleasure & the Security Impact is Colossal

    Scott Millis, CTO, Cyber adAPT, warns that the growing trend of using a single device for all professional and personal interactions is causing huge headaches for security teams

    1. Photo of Scott Millis

      Scott Millis

      CTO, Cyber adAPT

  12. Cybersecurity – Just Like Sex, Drugs & Rock ‘n’ Roll

    Just like sex, drugs & rock ‘n’ roll – we have to adapt our own behavior to get all of the benefits and minimize the chance of short, medium or long-term damage

    1. Photo of Ian  Kayne

      Ian Kayne

      Cybersecurity Practice Lead at Mason Advisory

  13. The Five Stages of Compliance Audit Grief

    Any psychotherapist will tell you there are a range of mind states adopted when dealing with grief of any kind. Nothing changes when dealing with the grief caused by having to manage a compliance audit. The good news? You will get through it

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  14. The Why and How of Ransomware

    Ransomware is undeniably becoming one of the biggest threats facing businesses today

    1. Photo of Matt Middleton-Leal

      Matt Middleton-Leal

      EMEA & APAC General Manager at Netwrix

  15. Tools of the Trade: Browsing Through the Hack Store

    By learning how to use free or low-cost downloadable and widely available tools, hackers can empower themselves over just about any mobile or desktop device, as well as over supposedly secure on-line network

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  16. Important Tips for Updating Your Breach Response Plan

    Dan Sarel, co-founder and VP of product management at Demisto, explores the importance of having an effective breach response plan

    1. Dan Sarel

      Co-founder and VP of Product Management, Demisto

  17. An Information Security Survival Guide

    Shred-it's Andrew Lenardon walks through the fives steps to a culture of security

    1. Photo of Andrew Lenardon

      Andrew Lenardon

      Global Accounts Director, Shred-it

  18. Four Applications You Should Blacklist Today

    It is important that companies take a proactive approach to blacklisting and removing high-risk applications or applications that have entered end-of-life

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  19. Noisy Fans & Fake Deli Coupons: How Hackers are Winning Now

    In the race to come up with new and more sophisticated ways to invade victims' computers and networks, hackers will use any means necessary – even a computer's fan

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  20. Protect Your Enterprise by Balancing WordPress Plugins

    SiteLock President Neill Feather and Crowd Favorite CEO Karim Marucchi outline what enterprises should consider in order to protect themselves from exposure via WordPress, mitigate cyber risks, and still ensure a pleasant online user experience

    1. Photo of Neill  Feather

      Neill Feather

      President, SiteLock

    2. Photo of Karim  Marucchi

      Karim Marucchi

      CEO, Crowd Favorite

What’s hot on Infosecurity Magazine?