Infosecurity Opinions

Hyper-Convergence and the Need for Greater Encryption

Hyper-Convergence and the Need for Greater Encryption

The challenge of encryption and hyper converged infrastructures.

Moving to the Cloud, but Stuck in the Past

Moving to the Cloud, but Stuck in the Past

Security architectures have become the biggest area of friction when moving to the public cloud.

Changing Face of DDoS and Threats to the Web Application Layer

Changing Face of DDoS and Threats to the Web Application Layer

It is clear that Mirai is still very much a disruptor, but over a year later, we can ask what lessons have been learned, and where we go to next.

Trust Wanes, Mitigation Reigns and a Mind-Set Change in 2018

Trust Wanes, Mitigation Reigns and a Mind-Set Change in 2018

The (mis)happenings of 2017 have illuminated poor practice and should serve as a call to action to individuals and businesses.

Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business

Public-Sector Cybersecurity Battles are Bleeding Over into Corporate Business

VDRs serve as the modern gold standard in information security.

Phishing Simulation Training Escalation

Phishing Simulation Training Escalation

One area of phishing simulation training that may not have matured is that once the metrics are analyzed, what do you do with the repeated clickers?

Coprocessor Attacks: the Hidden Threat

Coprocessor Attacks: the Hidden Threat

Coprocessors typically run their own firmware which—like any other computer code—can be vulnerable to attack.

Past and Present Tactics of Ransomware Attacks

Past and Present Tactics of Ransomware Attacks

Choosing the ransomware delivery mechanism is mostly a question of money.

What Does Data Loss Mean for Your Business?

What Does Data Loss Mean for Your Business?

Businesses need to get serious about data protection if they don’t want to be exposed to significant risks.

Understanding the Strengths and Weaknesses of Biometrics

Understanding the Strengths and Weaknesses of Biometrics

Significant advances have now made biometric authentication a truly viable and secure alternative to traditional forms of security.

Securing Smart Devices Requires Smarter Partnerships

Securing Smart Devices Requires Smarter Partnerships

While there are few IoT device vendors focused on adding security, this presents a big opportunity for manufacturers willing to be proactive in implementing and educating the market about the need for stronger security.

The Evolution of Corporate Authentication

The Evolution of Corporate Authentication

While it’s easy to feel overconfident if you’ve been lucky enough to avoid this type of problem, complacency can harm your business.

What’s Hot on Infosecurity Magazine?