Infosecurity Opinions

  1. Could a Weak Link in the Chain Hamper Retailer Implementation of PCI DSS Version 3.2?

    Application of the PCI DSS’s latest system is not a quick fix, but a means to an end.

    1. Photo of Andy Duck

      Andy Duck

      Business Development Manager at Barron McCann

  2. Overcoming Application Security Challenges

    The majority of strategic business processes are supported by software applications, so why does application security continue to receive less budget and attention than network security?

    1. Photo of Jim Ivers

      Jim Ivers

      Chief Marketing Officer, Cigital

  3. Is Compliance Bad for Security?

    Standards are a security bar for organizations to meet through compliance. Arguably their value is in the reassurance they provide stakeholders that a baseline of reasonable security measures is in place. But what if compliance is faked?

    1. Photo of Edward Hardy

      Edward Hardy

      Head of Consultancy, CNS Group

  4. A Moving Target: Why SMEs need Threat Intelligence

    Justifying security spend can be challenging as a SME: there are limited resources, you’re trying to defend against an unquantifiable range of threats, and there are plenty of other aspects of the business to invest in that can give tangible results.

    1. Photo of James Parry

      James Parry

      Technical Manager at Auriga

  5. Communications Security Beyond the Turret

    What was once a system based on a digital time-division multiplexing (TDM) architecture has turned into a high-tech Internet Protocol (IP) based work center

    1. Photo of Joe Malec

      Joe Malec

      Senior Security Analyst, Express Scripts

  6. Who is Responsible for Cybersecurity Within Your Organization?

    Don't underestimate the need for clear guidance on who should do what within an organization.

    1. Photo of Andrew Beckett

      Andrew Beckett

      Managing Director, EMEA, Kroll.

  7. Security from the Ground Up: The Need for Data Classification

    Governments, businesses large and small, and even private citizens worry over how to keep their digital assets out of the wrong hands.

  8. The Service Desk: The Unsung Hero of IT Security

    Estimates suggest that the gap between a data breach and discovery is somewhere in the region of 80 and 200+ days, depending on whose research you’re reading.

    1. Photo of Roberto Casetta

      Roberto Casetta

      International Senior Vice President & GM at Heat Software

  9. Considerations around NFV security

    DNS security needs to be built into the NFV architecture

    1. Photo of Dilip Pillaipakam

      Dilip Pillaipakam

      VP of service provider strategy and products at Infoblox

  10. Regular Check-ups: Pentesting-as-a-Service

    Penetration testing needs to be performed much more frequently than it is today by most organizations, and that requires a new type of service offering: ‘pentesting-as-a-service’.

    1. Nick Rafferty

      COO of SureCloud

  11. Machine Learning – Keeping Us One Step Ahead of Fraudsters

    While it is clear that machine learning has a lot to offer to financial institutions and merchants in an effort to detect and prevent fraud, the approach does have its limitations.

    1. Photo of Jackie Barwell

      Jackie Barwell

      Director of Fraud Product Management, ACI Worldwide

  12. Why Weakening Encryption Could be Throwing the Baby Out with the Bathwater

    Should communications providers be legally forced to break their own security when required, even if they must fundamentally change the way their encryption works in order to comply?

    1. Photo of Richard Anstey

      Richard Anstey

      CTO EMEA, Intralinks

  13. Walking the Line Between Data Protection and Privacy Invasion

    While there has been growing awareness of what we should, as consumers, do to secure our data, how can we be assured our data is being appropriately cared when we hand over information to companies?

    1. Photo of Michael Hack

      Michael Hack

      Senior vice president, Ipswitch

  14. Evading IT Threats: Integrating Security in Your Overall Cloud Strategy

    In cloud infrastructure, it becomes even more challenging to overcome such threats without incurring any losses.

    1. Photo of Rupesh Kumar

      Rupesh Kumar

      Director, Lepide Software

  15. How Context Can Provide Application-centric Security

    It’s the applications themselves that are the targets, because that is where the data is housed.

    1. Photo of Gad Elkin

      Gad Elkin

      Head of EMEA security, F5

  16. Access Badges: The link between physical and logical access

    Organizations using access badges to secure physical access to (all or part of) their premises increasingly ask for the ability to use the same badges for access to their network and applications.

    1. Photo of Dean Wiech

      Dean Wiech

      Managing Director, Tools4ever

  17. Fighting Back Against DDoS

    DDoS attacks will continue as targeted organizations pay the ransom fees

    1. Photo of John Bambenek

      John Bambenek

      Manager of Threat Systems, Fidelis Cybersecurity

  18. File Sharing: The Silent Threat

    Employees secretly transfer various forms of confidential information to cloud-based file-sharing services.

    1. Photo of John Moynihan

      John Moynihan

      Founder of Minuteman Governance

  19. Banking's Darkside Lurks in Your Inbox

    While banks cannot and will not be able to stop all attacks, staying up to date on current threats and investing heavily in security teams and technology will most certainly help them prevent most.

    1. Photo of Itay Glick

      Itay Glick

      Co-founder and CEO of Votiro

  20. Bridging the Gap Between Executive Cyber Awareness and Enterprise Security

    IT security professionals are facing greater challenges than ever before and should be providing greater visibility into how cybersecurity programmes are performing.

    1. Photo of Matt  Middleton-Leal

      Matt Middleton-Leal

      UK and Ireland Director, CyberArk

What’s Hot on Infosecurity Magazine?