Infosecurity Opinions

Overcoming the Ongoing Exploitation of Vulnerabilities

Overcoming the Ongoing Exploitation of Vulnerabilities

Looking at 2020 data to determine what cyber-criminals actions have been

Commercializing Health Data: Where do we Draw the Line?

Commercializing Health Data: Where do we Draw the Line?

What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?

COVID-19 Demonstrates Need for Human Error-Proof Security

COVID-19 Demonstrates Need for Human Error-Proof Security

80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security

How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy

How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy

There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.

#HowTo Evaluate the Security of New Applications

#HowTo Evaluate the Security of New Applications

Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable

Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?

Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?

In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN

Unified Identity: the Passport to Secure Personal Data Management

Unified Identity: the Passport to Secure Personal Data Management

Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.

Data Scientists vs. IT: Aligning on Open-Source Security

Data Scientists vs. IT: Aligning on Open-Source Security

The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.

How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?

How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?

The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively

Handle Misconfigurations in the Cloud

Handle Misconfigurations in the Cloud

Cloud misconfiguration is becoming a prevalent source of risk for organizations.

Demonstrating Scientific Data Integrity and Security in the Cloud

Demonstrating Scientific Data Integrity and Security in the Cloud

Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security

Digital Identity Has Changed, and Enterprises Have Not Changed With It

Digital Identity Has Changed, and Enterprises Have Not Changed With It

As the number of enterprise apps has increased, so have new authentication methods and identity tools

What’s Hot on Infosecurity Magazine?