Infosecurity Opinions

Winning the Cybersecurity Battle with Open Networking

Winning the Cybersecurity Battle with Open Networking

The best defense policy is one that is pre-emptively implemented before any attack

Why I Don't Blame Boards for Underinvesting in Cybersecurity

Why I Don't Blame Boards for Underinvesting in Cybersecurity

Security professionals need to present boards with something much more arresting: metrics and indicators

We’re Going to Need a Better Plan

We’re Going to Need a Better Plan

Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.

Combining Threat Playbooks with AI to Stop Cyber-Criminals

Combining Threat Playbooks with AI to Stop Cyber-Criminals

Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence

A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth

A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth

Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.

Proactively Protecting Sensitive Data

Proactively Protecting Sensitive Data

Traditional cybersecurity defenses are insufficient, as the steady stream of data breaches indicates

Building a Cyber Risk Report Your Board Will Love

Building a Cyber Risk Report Your Board Will Love

Cyber risk has emerged as one of the top risks to the enterprise so CISOs are being asked to report more frequently to the board

How Traditional SIEM Pricing Models Hamper Security

How Traditional SIEM Pricing Models Hamper Security

Traditional pricing models have so far been restrictive to security scalability

Why Are Security and Business Goals at Odds With Each Other?

Why Are Security and Business Goals at Odds With Each Other?

CISOs need to take the time to listen to what the priorities of others in the business are and what they consider to be measures of success.

Combining Threat Playbooks with AI to Stop Cyber-Criminals

Combining Threat Playbooks with AI to Stop Cyber-Criminals

Understanding the tactics, techniques, and procedures of cyber-criminals has been one of the most difficult and elusive elements of threat intelligence

Stop Throwing Spaghetti at the Wall

Stop Throwing Spaghetti at the Wall

The SOC Visibility Triad signifies a massive paradigm shift in cybersecurity

What’s Hot on Infosecurity Magazine?