Infosecurity Opinions

  1. Bridging the Gap Between Executive Cyber Awareness and Enterprise Security

    IT security professionals are facing greater challenges than ever before and should be providing greater visibility into how cybersecurity programmes are performing.

    1. Photo of Matt  Middleton-Leal

      Matt Middleton-Leal

      UK and Ireland Director, CyberArk

  2. Defending Against the APT Paradigm

    With an APT, it is very difficult to profile an attack and get an idea on which technologies would have helped or mitigated the attacks.

    1. Photo of Dennis Griffin

      Dennis Griffin

      Product Manager, Vidder

  3. Government Security and Data Breaches: Problems and Solutions

    OPM made painfully clear the need for government (and other) organizations to adopt security policies.

    1. Photo of Asaf Cidon

      Asaf Cidon

      VP Email Security, Barracuda

  4. A Love Letter to my Network

    Network we have been through so much together and we look together to an exciting future.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  5. How to "Nudge" Your Business Back to Better Mobile Security

    Some businesses might think they're too small for a hacker to notice, but that’s a myth

    1. Photo of Tony Anscombe

      Tony Anscombe

      Senior Security Evangelist at AVG, AVG

  6. Meeting the Security Needs of SMEs in the Cloud

    Some experts believe SMEs are serving as test lab for techniques to use on bigger targets.

    1. Photo of Oscar Marquez

      Oscar Marquez

      CTO of iSheriff

  7. There’s a RAT in Your Mobile

    At the forefront of this wave of attacks on financial services organizations are Remote Access Trojans (RATs).

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  8. IP Cameras – The All-Seeing IoT Security Challenge

    The growth of the Internet of Things (IoT) has seen substantial momentum in the last two years.

    1. Photo of Matt Walmsley

      Matt Walmsley

      EMEA Director at Vectra Networks

  9. Out of Sight, Out of Mind?

    It pays to do your homework and nail down contractual arrangements with your virtualization or cloud provider to ensure the service meets the needs of the business.

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  10. Business Decisions: Is It Time to Outsource Your Network Security?

    If you cheap out on the IT company, or hire someone at the lowest price point, don’t expect stellar service.

    1. Photo of David Wray

      David Wray

      Founder of Sec-Tec Ltd

  11. Locking Passwords Away – For Good

    The methods for enterprise-level protection of bulk passwords and personally identifiable information have remained fundamentally unchanged over the past 20 years.

    1. Photo of Nick Lowe

      Nick Lowe

      CEO of Silicon:SAFE

  12. Single Sign-On: Taking a Global Approach

    Single Sign-On (SSO) solutions alleviate authentication processes by managing access to multiple applications.

    1. Photo of Thierry Bettini

      Thierry Bettini

      Director of International Strategy, ILEX

  13. Top Ten Big Data Security and Privacy Challenges

    To better understand the Big Data security and privacy challenges, the CSA Big Data research working group identified the top ten challenges

    1. Photo of Nitin Yadav

      Nitin Yadav

      Marketing Analyst

  14. Why Security Professionals Should Care about NoSQL and Big Data

    The top five reasons you should care about NoSQL:

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  15. Changing the Rules of the Game

    Maybe the common defensive approach is not good enough; maybe it is time for more defenders to step-up their game and introduce “game” changing rules?

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  16. The Exponential Growth of DDoS Attacks

    What we are seeing here is a trend in which the power of DDoS attacks is going in a general upwards direction.

    1. Adam King

      Security Consultant at PGI Cyber

  17. Blocking Slings, Arrows & Rogue IPs: Securing Networks the Medieval Way

    When it comes to protecting critical assets, not much has changed since medieval times: keep out the known bad guys, be suspicious of those you don’t know, and make it easy to identify those you do trust.

    1. Photo of Richard Page

      Richard Page

      Marketing director EMEA, CEE and Russia for Ixia

  18. Defence in Breadth

    Exploring the security imperative for today’s complex networks and the need to look at breadth, as well as depth.

    1. Photo of Jason Dover

      Jason Dover

      Director of Product Line Management at KEMP Technologies

  19. How Do You Really Know if Your Software Security Measures Up?

    Organisations are trying to determine where to start, how to construct a viable initiative, and what resources they will require.

    1. Photo of Sammy Migues

      Sammy Migues

      Principal Scientist at Synopsys

  20. How Can You Fend Off a Nation?

    While many cyber-attacks are crude in their design and sloppy in their deployment, state sponsored attacks can sometimes exude sophistication.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

What’s Hot on Infosecurity Magazine?