Infosecurity Opinions

  1. Moving to the Work From Home SOC

    Troubleshooting is harder when remote

    1. Photo of Chris Triolo

      Chris Triolo

      VP of customer success at Respond Software

  2. How Cloud-Based Training Can Better Enable Remote Workers

    The cloud, after all, is designed to suit the needs of a distributed workforce

    1. Photo of Zvi Guterman

      Zvi Guterman

      Founder and CEO, CloudShare

  3. How You Can Avoid an IoT Doomsday

    The slightest misconfiguration or poor security practices can serve as a point of entry for sophisticated cyber-attacks

    1. Photo of Ken Galvin

      Ken Galvin

      Senior Product Manager for KACE System Management Appliance

  4. #HowTo Cut Costs in the SOC

    Ways where you can reduce costs but not efficiency in your SOC

    1. Photo of Mark Orlando

      Mark Orlando

      Co-founder, Bionic Cyber

    2. Photo of Ryan Shaw

      Ryan Shaw

      Co-founder, Bionic Cyber

  5. Data Security is Everyone’s Problem

    Data security must be management-led, and followed by everyone.

    1. Photo of Alan Bentley

      Alan Bentley

      President of Global Strategy, Blancco

  6. GDPR Two Years On – Has it Gone How we Hoped?

    Two years on, did the introduction of the GDPR go as planned?

    1. Photo of James Chappell

      James Chappell

      Co-Founder & Chief Innovation Officer, Digital Shadows

  7. Why the Industry Needs to Step Up Action on Malicious Domains

    Why steps need to be taken to stamp out malicious domains more than ever

    1. Photo of Patrick Martin

      Patrick Martin

      Head of threat intelligence, Skurio

  8. Bank Data Integrity and #COVID19: Stop Copying Your Data!

    Thanks to COVID-19, everything is disrupted – including how banks handle data security

    1. Photo of Dan   DeMers

      Dan DeMers

      CEO and Co-Founder, Cinchy

  9. Breaking Cryptography: Securing Machine Identities in a Post-Quantum World

    The next quantum generation of machine identities could be unhackable

    1. Photo of Ashish Pala

      Ashish Pala

      Global Security Architect, Venafi

  10. Overcoming the Unique Challenge of Securing OT in the Digital Era

    High-value industries powered by OT are attractive targets for cyber-attacks

    1. Photo of Galina Antova

      Galina Antova

      Chief business development officer and co-founder of Claroty.

  11. Mal-Innovation on Mobile: A Changing Threat Landscape

    When it comes to enterprise mobile security, innovation is the biggest hurdle to overcome

    1. Photo of Michael Covington

      Michael Covington

      VP of Product Strategy, Jamf

  12. Making Security a Business Priority: Four Things to Communicate to Leadership

    Four talking points IT teams can better communicate to avoid a catastrophic cyber incident before it’s too late

    1. Photo of Wade Woolwine

      Wade Woolwine

      Principal Security Researcher, Rapid7

  13. Will COVID-19 be the Catalyst to Finally Replace Passwords With Biometrics?

    Could Coronavirus be the catalyst that pushes us to swap out passwords for more secure and private authentication protocols?

    1. Photo of Paolo Gasti

      Paolo Gasti

      Chief Technology Officer at Keyless Technologies

  14. How Bots Can Attack Your Web Application – And How To Stop Them

    A new focus on sophisticated bots is emerging and how to spot real users from imposters

    1. Mike Tery

      Product manager, WhiteOps

  15. Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners

    Zero Trust Application Access can literally be a game changer for organizations

    1. Photo of Gil Azrielant

      Gil Azrielant

      co-founder and CTO of Axis Security

  16. Viruses Still Spread, Get Ready for Containment

    It’s essential that management be capable of immediate containment, isolation and eradication of these threats.

    1. Photo of John Moynihan

      John Moynihan

      Founder of Minuteman Governance

  17. AI and Data Privacy: Compatible, or at Odds?

    How do we leverage the best of what AI has to offer without compromising data privacy?

    1. Photo of Dr. Yinglian Xie

      Dr. Yinglian Xie

      CEO and Co-Founder of DataVisor

  18. Data Protection – Another COVID-19 Casualty?

    Has data protection has become another casualty of the Coronavirus?

    1. Photo of Julian Hayes

      Julian Hayes

      Head of the Data Protection team, BCL Solicitors LLP

    2. Photo of Andrew Watson

      Andrew Watson

      Legal assistant at BCL Solicitors LLP

  19. White-Box Encryption: Ending Web App Vulnerability

    White-box cryptography is a solution that provides software-based key storage.

    1. Photo of Bill  Horne

      Bill Horne

      Vice President and General Manager, Intertrust Secure Systems

  20. #HowTo Better Prevent Banking App Breaches

    Banks need to go beyond relying on network and device security to protect their APIs, apps and customers’ private data.

    1. Photo of Felicia Haggarty

      Felicia Haggarty

      Director, Data Theorem

What’s Hot on Infosecurity Magazine?