Infosecurity Opinions

  1. Breaking Cryptography: Securing Machine Identities in a Post-Quantum World

    The next quantum generation of machine identities could be unhackable

    1. Photo of Ashish Pala

      Ashish Pala

      Global Security Architect, Venafi

  2. Overcoming the Unique Challenge of Securing OT in the Digital Era

    High-value industries powered by OT are attractive targets for cyber-attacks

    1. Photo of Galina Antova

      Galina Antova

      Chief business development officer and co-founder of Claroty.

  3. Mal-Innovation on Mobile: A Changing Threat Landscape

    When it comes to enterprise mobile security, innovation is the biggest hurdle to overcome

    1. Photo of Michael Covington

      Michael Covington

      VP of Product Strategy, Jamf

  4. Making Security a Business Priority: Four Things to Communicate to Leadership

    Four talking points IT teams can better communicate to avoid a catastrophic cyber incident before it’s too late

    1. Photo of Wade Woolwine

      Wade Woolwine

      Principal Security Researcher, Rapid7

  5. Will COVID-19 be the Catalyst to Finally Replace Passwords With Biometrics?

    Could Coronavirus be the catalyst that pushes us to swap out passwords for more secure and private authentication protocols?

    1. Photo of Paolo Gasti

      Paolo Gasti

      Chief Technology Officer at Keyless Technologies

  6. How Bots Can Attack Your Web Application – And How To Stop Them

    A new focus on sophisticated bots is emerging and how to spot real users from imposters

    1. Mike Tery

      Product manager, WhiteOps

  7. Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners

    Zero Trust Application Access can literally be a game changer for organizations

    1. Photo of Gil Azrielant

      Gil Azrielant

      co-founder and CTO of Axis Security

  8. Viruses Still Spread, Get Ready for Containment

    It’s essential that management be capable of immediate containment, isolation and eradication of these threats.

    1. Photo of John Moynihan

      John Moynihan

      Founder of Minuteman Governance

  9. AI and Data Privacy: Compatible, or at Odds?

    How do we leverage the best of what AI has to offer without compromising data privacy?

    1. Photo of Dr. Yinglian Xie

      Dr. Yinglian Xie

      CEO and Co-Founder of DataVisor

  10. Data Protection – Another COVID-19 Casualty?

    Has data protection has become another casualty of the Coronavirus?

    1. Photo of Julian Hayes

      Julian Hayes

      Head of the Data Protection team, BCL Solicitors LLP

    2. Photo of Andrew Watson

      Andrew Watson

      Legal assistant at BCL Solicitors LLP

  11. White-Box Encryption: Ending Web App Vulnerability

    White-box cryptography is a solution that provides software-based key storage.

    1. Photo of Bill  Horne

      Bill Horne

      Vice President and General Manager, Intertrust Secure Systems

  12. #HowTo Better Prevent Banking App Breaches

    Banks need to go beyond relying on network and device security to protect their APIs, apps and customers’ private data.

    1. Photo of Felicia Haggarty

      Felicia Haggarty

      Director, Data Theorem

  13. Keeping Your Backups Safe from Ransomware Attacks

    If you don’t practice data backup hygiene, files could end up encrypted during the ransomware attack.

    1. Photo of Victor Congionti

      Victor Congionti

      CEO, Proven Data

  14. Making Security a Team Sport is Critical to Identity Access Management Success

    A framework to make IAM collaborative, determining stakeholders and making security everyone’s job.

    1. Photo of Adam Bosnian

      Adam Bosnian

      Executive vice president of global business development, CyberArk

  15. Why You Should Stop Measuring Cybersecurity in Terms of Budget

    There is a disconnect between how companies measure their cybersecurity readiness and achieving effective security in reality.

    1. Photo of Max  Vetter

      Max Vetter

      Chief Cyber Officer, Immersive Labs

  16. People, We Need to Talk About Mass Electronic Surveillance

    The ethics of nationwide electronic surveillance databases related to #COVID19

    1. Photo of Martin Wilcox

      Martin Wilcox

      VP Technology EMEA at Teradata

  17. How Useful Is MITRE's '25 Most Dangerous Software Errors' List?

    As it is based on real-world data rather than anecdotal reports, the CWE Top 25 becomes a measure of what matters most.

    1. Photo of Oleg Kolesnikov

      Oleg Kolesnikov

      VP of Threat Research/Cybersecurity, Securonix

  18. Winning the War on Fraud During COVID-19

    Securing this new geographically dispersed workforce and protecting every employee from fraud is the next major concern

    1. Photo of Brett Beranek

      Brett Beranek

      VP & General Manager, Security and Biometrics, Nuance

  19. Retaining Encryption Keys

    Organizations need to both be able to secure their cryptographic keys away from the encrypted data and be able to manage and view them

    1. Photo of Faiyaz Shahpurwala

      Faiyaz Shahpurwala

      Chief Product & Strategy Officer at Fortanix

  20. Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security

    With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective

    1. Photo of Dmitry Raidman

      Dmitry Raidman

      CEO, CTO, and Co-Founder, Cybeats

What’s Hot on Infosecurity Magazine?