Infosecurity Opinions

Application Security Report: Urgent Need for Remediation

Application Security Report: Urgent Need for Remediation

Remediation rates for security flaws have been gradually declining

We’ve Been Breached! What Do You Want From Us?

We’ve Been Breached! What Do You Want From Us?

While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

#HowTo Develop a Detection and Response Strategy for Email Phishing

#HowTo Develop a Detection and Response Strategy for Email Phishing

You need to get your employees on board to help prevent phishing

Why Understanding the User Experience is Essential to Good Security

Why Understanding the User Experience is Essential to Good Security

Security and usability have traditionally been opposing concepts.

Bots x Humans: a Solution is Needed

Bots x Humans: a Solution is Needed

Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

Your Employees are Taking Your Data

Your Employees are Taking Your Data

Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

Where Are All the Humans?

Where Are All the Humans?

Separating hype from reality

Trust the Machine: How Security Analysts Can Relinquish Control

Trust the Machine: How Security Analysts Can Relinquish Control

Instead of spending time undertaking mundane monitoring tasks, they need to embrace automated solutions

Thinking Outside the National Vulnerability Database Box

Thinking Outside the National Vulnerability Database Box

Why relying on a single source of the truth is not a good idea

How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats

How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats

The threat landscape is changing, but so is the security tools market

Securing Linux Systems in a New Vulnerable World

Securing Linux Systems in a New Vulnerable World

Securing Linux-based systems and devices has become a pressing challenge for developers and device manufacturers

Is IAM a Pink Elephant in Businesses?

Is IAM a Pink Elephant in Businesses?

IAM programs should ensure the risk is clear to help clients build a complete, security-rich solution

What’s Hot on Infosecurity Magazine?