Infosecurity Opinions

  1. Is Your Organization Ready to Defend Insider Threats?

    How can you assess your organization’s readiness to detect and respond to an Insider threat attack?

    1. Photo of Henry  Hon

      Henry Hon

      Manager (Cyber Defense), KPMG

  2. Sleepwalking into a Cybersecurity Nightmare?

    Now is the time for investing in and implementing technologies

    1. Photo of John Vladimir Slamecka

      John Vladimir Slamecka

      EMEA & LatAm President, AT&T Business

  3. Making Cybersecurity a Priority in the Boardroom

    The top five cybersecurity governance challenges, and levers to solve them

    1. Photo of Phil Cracknell

      Phil Cracknell

      Consultant

  4. #HowTo Create a Budget-Friendly Security Testing Program

    Compromising on application security testing can have serious implications, and it is important to not skip it.

    1. Photo of Mark Horvath

      Mark Horvath

      Senior Research Director, Gartner

  5. The Glaring Vulnerabilities in Power Distribution Networks Today

    Legacy industrial control system protocols are commonly used throughout power systems, and have little or no security measures and lack authentication capabilities.

    1. Photo of Elad Ben-Meir

      Elad Ben-Meir

      CEO, SCADAfence

  6. Web Application Threats: Mapping Out Your Attack Surface

    Security teams must gain a better understanding of weakness in their application architecture in order to reduce their overall attack surface.

    1. Photo of Stephane Konarkowski

      Stephane Konarkowski

      Senior Security Consultant, Outpost24

  7. A CISO For The 2020s – More Than Just a Dashboard Driver

    The CISO of 2020 is one who is aware of all this and is willing to innovate.

    1. Photo of Paul Edon

      Paul Edon

      Senior Director (EMEA), Tripwire

  8. Vaccine Developers are at Risk: How to Fight Hackers and Address the Health Crisis

    Pharmaceutical organizations researching a vaccine are taking the right steps toward a strong security posture

    1. Photo of Jake Olcott

      Jake Olcott

      Vice President of Government Affairs at BitSight

  9. COVID-19 Vs Data Center? Best Practices to Weather the Storm!

    How the shift will affect data center operators and what they can do to efficiently tackle it

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  10. Overcoming the Ongoing Exploitation of Vulnerabilities

    Looking at 2020 data to determine what cyber-criminals actions have been

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  11. Commercializing Health Data: Where do we Draw the Line?

    What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?

    1. Photo of Adam Kujawa

      Adam Kujawa

      Director, Malwarebytes

  12. COVID-19 Demonstrates Need for Human Error-Proof Security

    80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security

    1. Photo of Nigel Thompson

      Nigel Thompson

      VP, BlackBerry

  13. How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy

    There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.

    1. Photo of Elliot Dellys

      Elliot Dellys

      EMEA Director of Strategic Consulting, Trustwave

  14. #HowTo Evaluate the Security of New Applications

    Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable

    1. Photo of Chris Hass

      Chris Hass

      Director of Information Security and Research at Automox

  15. Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?

    In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN

    1. Photo of Francois Rodriguez

      Francois Rodriguez

      Chief Growth Officer, Adeya

  16. Unified Identity: the Passport to Secure Personal Data Management

    Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.

    1. Photo of Ben Todd

      Ben Todd

      Director of Sales at Nomidio

  17. Data Scientists vs. IT: Aligning on Open-Source Security

    The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.

    1. Photo of Saundra Monroe

      Saundra Monroe

      Principal product manager, Anaconda

  18. How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?

    The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively

    1. Photo of Michal  Gabrielczyk

      Michal Gabrielczyk

      Head of Edge AI at Cambridge Consultants

  19. Handle Misconfigurations in the Cloud

    Cloud misconfiguration is becoming a prevalent source of risk for organizations.

    1. Photo of Aaron Sawitsky

      Aaron Sawitsky

      Senior product marketing manager, Rapid7

  20. Demonstrating Scientific Data Integrity and Security in the Cloud

    Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security

    1. Photo of Damian Tiller

      Damian Tiller

      Quality Assurance Manager, IDBS

What’s Hot on Infosecurity Magazine?