Infosecurity Opinions

  1. Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security

    With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective

    1. Photo of Dmitry Raidman

      Dmitry Raidman

      CEO, CTO, and Co-Founder, Cybeats

  2. Behind the Scenes of Dark Net Market Closures and Their Consequences

    What happens behind the scenes of Dark Net market closures and how these sites are being replaced by smaller, specialized stores.

    1. Photo of David Carmiel

      David Carmiel

      CTO, KELA

  3. Networking in the Time of COVID-19

    Innovations have shifted enterprise technology out of on-premise hardware and onto cloud-based platforms

    1. Photo of Jesper Andersen

      Jesper Andersen

      President and CEO, Infoblox

  4. The Role of Containerization to Protect Enterprise Cloud Ecosystems

    The security posture of unmanaged endpoints is below that of the organization’s managed devices

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  5. Remote Working: How To Protect Your Employees’ Mental Health

    Coping with everything that’s happening and the shift to working in isolation is proving rather difficult for many workers.

    1. Photo of Orion Talmay

      Orion Talmay

      Wellness Expert

  6. We Don’t Need More Cybersecurity, We Need Better Cybersecurity

    Why are data breaches becoming more frequent and more costly?

    1. Photo of Jason Revill

      Jason Revill

      Director of UK and Ireland Security Consulting, Avanade

  7. Why You Want to Fail a Red Team Exercise

    Why failing a Red Team exercise is good and what happens afterwards is more important.

    1. Photo of Gemma Moore

      Gemma Moore

      Director, Cyberis

  8. The Do’s and Don’ts of Building a Cybersecurity Program

    Pointers on the do’s and don’ts of building an effective security program.

    1. Photo of Nick Frost

      Nick Frost

      Director of Cyber Risk Management Group (CRMG)

  9. Bad UX Design Always Leads to Compromised Security

    When you make things with the user in mind, you create experiences that are free of frustrations

    1. Photo of Jacqueline Carter

      Jacqueline Carter

      Software engineer and a tech writer

  10. Business as (un)usual: Communicating During a Pandemic, and Beyond

    A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  11. #HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering

    Social engineering is also a matter of thinking out of the box

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  12. How the MSSPs Can Strive to be Detection Ninjas

    An MSSP engineers for both situational awareness and situational consistency.

    1. Photo of Pukhraj Singh

      Pukhraj Singh

      Product Owner, Cyber Threat Detection, SilverSky by BAE Systems

  13. The Bigger Perimeter Picture of #COVID19

    Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model

    1. Photo of Phil Allen

      Phil Allen

      VP EMEA, Ping Identity

  14. Reinventing the Role of the Tier 1 SOC Analyst

    Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  15. What Actually IS a Cyber Range, and How Has It Evolved?

    A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how

    1. Photo of Debbie Gordon

      Debbie Gordon

      CEO and Founder of Cloud Range Cyber

  16. Automating Security With Intelligence

    Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.

    1. Photo of Karen Levy

      Karen Levy

      Vice President, Product and Client Marketing, Recorded Future

  17. Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments

    Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.

    1. Photo of Chris Sherry

      Chris Sherry

      Regional Vice President EMEA, Forescout

  18. Preparing for Tomorrow: Cybersecurity in a Remote World

    The cost effective option of permanent remote working

    1. Photo of Chris Jenkins

      Chris Jenkins

      Sales Director, UK and Ireland, Proficio

  19. Is a Wiped Computer Truly Wiped?

    Just because data appears to be gone doesn’t mean that it really is

    1. Mike Savitz

      Principal Consultant, The Crypsis Group

  20. Why SASE Can be Your Solution in a Time of Uncertainty

    With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption

    1. Photo of Dave Martin

      Dave Martin

      Senior Director, Product Management of Threat Response at Open Systems

What’s Hot on Infosecurity Magazine?