Infosecurity Opinions

  1. As Industry 4.0 Marches on, the Manufacturing Sector Must be Better Prepared for Cyber-Attacks

    The idea of factories full of driverless forklifts and collaborating robot workers was once the stuff of pure science fiction, but has now become the common reality for smart factories around the world

    1. Photo of Mirko  Brandner

      Mirko Brandner

      Technical Manager, Arxan Technologies

  2. How to Avoid Drowning in your Security ‘Data Lakes’

    Security monitoring is a ubiquitous task throughout all enterprises that are attempting to not only thwart malicious activities but to understand and optimize authentic traffic to their information systems

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  3. How to Prepare for the EU GDPR

    A recent report revealed that only 4% of British companies understand the impact of the European Commission’s upcoming GDPR. For the remaining 96%, it is very much in their interest to find out

    1. Photo of Simon Kouttis

      Simon Kouttis

      Head of Cyber Security, Stott and May

  4. Effective App Security: the Importance of Collaboration throughout the Command Chain

    In today’s online business environment, application security has never been more important. However, effective app security doesn’t just happen overnight, it requires a concerted effort from all parts of the business command chain

    1. Photo of Ryan O’Leary

      Ryan O’Leary

      VP Threat Research Centre, WhiteHat Security, WhiteHat Security

  5. Are Unsecure Medical Devices Opening the Backdoor for Hackers?

    Medical/health institutions must prioritize the management of user access if they want to ensure they have the adequate security levels around these access points

    1. Photo of Stuart Facey

      Stuart Facey

      VP International, Bomgar Corporation

  6. Signatures Are Dead, Now What?

    With LANGSEC technology able to instantly and accurately identify any malicious behavior within an application, why risk securing your application solely with perimeter protections?

    1. Photo of Kunal  Anand

      Kunal Anand

      CTO & CISO at Imperva

  7. The CISO Insomniac: What’s Keeping Them Awake at Night?

    There has never been a tougher time to be a Chief Information Security Officer. Regulatory changes across the EU have led to the introduction of much more stringent controls on how businesses should manage the customer data they collect

    1. Photo of Dr Darren Brooks

      Dr Darren Brooks

      EMEA Delivery Lead for Security Services, Unisys

  8. Four Lessons to Learn From the SWIFT Hacks

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  9. Media Organizations Beware – DDos Attacks are Coming

    There are many reasons behind a DDoS attack but one thing we have continued to see is the rise of DDoS attacks on media publications

    1. Photo of Tom Bienkowski

      Tom Bienkowski

      Director of Product Marketing, Arbor Networks

  10. Hack Hillary Clinton’s Email? Just Say Nyet

    Donald Trump's recent comments on Russian hacking are unethical, negligent and dangerous

    1. Photo of Nathan Wenzler

      Nathan Wenzler

      Senior Director of Cybersecurity, Moss Adams

  11. The Future of Mobile Security

    Mobility has become the new normal for computing, but the enterprise is not fully embracing the capabilities of always-on, always-connected, devices as a result of inadequate security tools.

    1. Photo of Alan Goode

      Alan Goode

      Managing Director, Goode Intelligence

  12. Cyber Fraud: The Unpunished Crime

    A recent report from the Fraud Advisory Panel discovered that victims suffer an average loss of £101,000 to cyber-fraud; yet a staggering one in three cases are not passed on for further investigation.

    1. Photo of Peter Martin

      Peter Martin

      Managing Director at RelianceACSN

  13. How IT/OT Collaboration Holds the Key to Manufacturing Security

    The new cyber reality has made operational technology (OT) operators crucial to securing manufacturing networks—the most targeted sector of industrial cyber-attacks in 2015, according to the U.S. Department of Homeland Security.

    1. Photo of Yoni Shohet

      Yoni Shohet

      Co-founder and CEO of SCADAfence

  14. Building an Effective Incident Response Plan

    A thoroughly prepared organization will suffer much less fallout when a comprehensive incident response plan is adopted and in place

    1. Photo of Rishi Bhargava

      Rishi Bhargava

      Co-founder and VP, Marketing for Demisto

  15. Five Lessons for Good Airport Security Practices

    Unfortunately for the people that run Tampa International Airport, they experienced an IT security breach as reported in May. However, unlike a lot of the other organizations, because it is an international airport, the profile of the breach was far higher because of its security status.

    1. Photo of Will Cuthbert

      Will Cuthbert

      Director of Solutions Engineering at Bomgar

  16. Security for IoT devices

    The whole IoT system should be architected in a way that protects information and assets at all levels.

    1. Photo of Mike Eftimakis

      Mike Eftimakis

      IoT Product Manager – ARM Ltd

  17. The Growth of Runtime Application Self Protection

    RASP based technologies promise to eliminate false positives, reduce the complexity of securing applications and to lock down the most common vulnerabilities being exploited today.

  18. 24x7 SOCs: The Answer to all Monitoring and Logging Needs?

    Monitoring and logging are crucial aspects of cyber assurance strategies that have been around for many years, however, the reality that cyber-attacks and breaches now happen to anyone and everyone is inevitably bringing the need for round the clock ‘situational awareness’ to the fore.

    1. Photo of Noreen Beg

      Noreen Beg

      compliance service delivery lead at Nettitude

  19. Too Many Incident Responders are Chasing Fires that do not Exist

    There’s a fundamental problem with security tools in the market today: they detect and judge events in isolation.

    1. Photo of Ryan Stolte

      Ryan Stolte

      co-founder and CTO at Bay Dynamics

  20. Yesterday’s News: Security is a Board level issue

    The fact that cybersecurity is a board issue is yesterday’s news. You’d be hard pressed today to find a CISO who isn’t spending more time preparing reports for their executive and audit committees. Today’s dilemma is what information to share in order to help inform business decisions.

    1. Photo of Nik Whitfield

      Nik Whitfield

      chairman and founder, Panaseer

What’s hot on Infosecurity Magazine?