Infosecurity Opinions

  1. Protect Your Enterprise by Balancing WordPress Plugins

    SiteLock President Neill Feather and Crowd Favorite CEO Karim Marucchi outline what enterprises should consider in order to protect themselves from exposure via WordPress, mitigate cyber risks, and still ensure a pleasant online user experience

    1. Photo of Neill  Feather

      Neill Feather

      President, SiteLock

    2. Photo of Karim  Marucchi

      Karim Marucchi

      CEO, Crowd Favorite

  2. Preventing Privileged Account Abuse

    Fraud or theft that occurs as a result of privileged account abuse is one of the most challenging for organizations to identify

    1. Photo of Balázs   Scheidler

      Balázs Scheidler

      Co-founder and CTO, Balabit

  3. Edge Computing & Security: Rethinking Compliance & Data Protection in a Mobile-First Environment

    IT today is no longer solely linked to specific machines sitting on desks; the growth of mobile and remote working means that users have more options on what devices they use, how they use them and where they get work done

    1. Photo of Andrew Nielsen

      Andrew Nielsen

      Director of Enterprise Security, Druva

  4. How Can We Achieve 50/50 Gender Parity in Cybersecurity?

    Lucy Chaplin, associate of (ISC)², manager at KPMG, on how the company tackled the gender gap in security

    1. Photo of Lucy Chaplin

      Lucy Chaplin

      Associate of (ISC)², Manager at KPMG

  5. The Cyber Cold War: the Newest Front in Political & Corporate Espionage

    The days of spies looking to get their hands on state and trade secrets are still alive and well today - except, now they’re digital

    1. Photo of Steven Malone

      Steven Malone

      Director of Security Product Management, Mimecast

  6. The Changing Role of the ISP & How Net Neutrality Laws Impact Cyber Defense

    Net neutrality is one of the internet’s guiding principles. The concept that Internet Service Providers (ISP) should direct all content and traffic from one destination to another, without passing judgment about the content, is widely recognized as the best means to preserve free speech online and encourage economic growth

    1. Photo of Dave Larson

      Dave Larson

      COO/CTO, Corero Network Security

  7. Think People First when Improving Cybersecurity Posture

    Cybersecurity remains a frequent topic of discussion throughout many enterprises due to high-profile breaches

    1. Photo of Dotan Bar Noy

      Dotan Bar Noy

      CEO at ReSec Technologies

  8. The Pros and Cons of DNS Encryption

    The way governments deal with cybersecurity monitoring has never been more at the forefront of industry discussions, particularly with ongoing debate in the UK around the Investigatory Powers Bill raising the question of how – and if – governments should monitor data transmissions

    1. Photo of Rod Rasmussen

      Rod Rasmussen

      Vice-President, Cybersecurity, Infoblox

  9. The Four Cybersecurity Terms Businesses Need to Know

    Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind

    1. Photo of Monzy Merza

      Monzy Merza

      Director of cyber research, Splunk

  10. The Four Steps to AppSec in the Age of Dynamic Language Processing

    With more and more companies moving to the cloud to run their businesses, the pressure on developers to push out web applications at a rapid pace is continuing to grow

    1. Photo of Mike Milner

      Mike Milner

      Co-Founder and CTO, IMMUNIO

  11. The Insider Threat Intelligence You Likely Aren’t Using, But Are Already Paying For

    Security teams need to take advantage of a significant source of intelligence already available in the company - the HR team

    1. Photo of David Green

      David Green

      chief security officer of Veriato

  12. A Guide to Cyber Threat Hunting Operations

    Tim Bandos, director of cybersecurity at Digital Guardian, discusses where businesses should start when conducting their own cyber threat hunts

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  13. Are We Reaching Peak Data?

    Many security teams cannot respond to what is in front of them, because there is simply too much

    1. Photo of Ed Macnair

      Ed Macnair

      CEO, CensorNet

  14. Tit-for-Tat: Cyber Retaliation

    In recent weeks, two examples highlight the dangerous precedent of the 'tit-for-tat' mentality in the cyber domain

    1. Photo of Ash J. Hunt

      Ash J. Hunt

      Contributing Writer

  15. Breach Detection or Breach Prevention?

    How can IT teams balance the need to prevent with the need to detect?

    1. Photo of Gur Shatz

      Gur Shatz

      Chief Technology Officer, Cato Networks

  16. As Industry 4.0 Marches on, the Manufacturing Sector Must be Better Prepared for Cyber-Attacks

    The idea of factories full of driverless forklifts and collaborating robot workers was once the stuff of pure science fiction, but has now become the common reality for smart factories around the world

    1. Photo of Mirko  Brandner

      Mirko Brandner

      Technical Manager, Arxan Technologies

  17. How to Avoid Drowning in your Security ‘Data Lakes’

    Security monitoring is a ubiquitous task throughout all enterprises that are attempting to not only thwart malicious activities but to understand and optimize authentic traffic to their information systems

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  18. How to Prepare for the EU GDPR

    A recent report revealed that only 4% of British companies understand the impact of the European Commission’s upcoming GDPR. For the remaining 96%, it is very much in their interest to find out

    1. Photo of Simon Kouttis

      Simon Kouttis

      Head of Cyber Security, Stott and May

  19. Effective App Security: the Importance of Collaboration throughout the Command Chain

    In today’s online business environment, application security has never been more important. However, effective app security doesn’t just happen overnight, it requires a concerted effort from all parts of the business command chain

    1. Photo of Ryan O’Leary

      Ryan O’Leary

      VP Threat Research Centre, WhiteHat Security, WhiteHat Security

  20. Are Unsecure Medical Devices Opening the Backdoor for Hackers?

    Medical/health institutions must prioritize the management of user access if they want to ensure they have the adequate security levels around these access points

    1. Photo of Stuart Facey

      Stuart Facey

      VP International, Bomgar Corporation

What’s hot on Infosecurity Magazine?