Infosecurity Opinions

  1. The Key to Successfully Managing Cyber Risk: Speed

    No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.

    1. Photo of Grant Moerschel

      Grant Moerschel

      VP Product Marketing, SentinelOne

  2. RE: Thinking Email Security

    Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed

    1. Photo of Mariana  Pereira

      Mariana Pereira

      Director of Email Security Products, Darktrace

  3. The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives

    Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  4. Lessons From the World’s Crash-Course into Telecommuting During #COVID19

    A few weeks into the Covid-19 disruptions, some first-hand observations from the field that apply to organizations globally

    1. Photo of Shane Stephens

      Shane Stephens

      Senior Engineer, Forescout

  5. Zelle: A New Door Opens, But is Crime Walking In?

    Zelle fraud is the fastest growing area of account takeover fraud in the U.S. banking sector.

    1. Photo of Uri Rivner

      Uri Rivner

      Chief Cyber Officer, BioCatch

  6. #HowTo Secure Distributed Cloud Systems in Enterprise Environments

    How can organizations secure distributed cloud systems while maintaining efficiency?

    1. Photo of Soumik Sarkar

      Soumik Sarkar

      Chief Technology Officer & Co-Founder, Crosscode

  7. Steps to Implementing Voice Authentication and Securing Biometric Data

    What are the steps to implementing a voice verification system, and how should the voiceprint data be secured?

    1. Photo of Miroslav Jirků

      Miroslav Jirků

      VP of Marketing, Phonexia

  8. Debunking Myths about Quantum Cryptography

    Given how much data is stolen from U.S. industry and government, quantum could be a huge problem.

    1. Photo of John Prisco

      John Prisco

      CEO of Quantum Xchange

  9. Top Ways to Guard Against Work-from-Home Phishing Threats

    Best practices that can help raise awareness of potential phishing techniques and other scams

    1. Photo of A.N. Ananth

      A.N. Ananth

      Chief Strategy Officer at Netsurion

  10. How Can Facebook Avoid the Wrath of the Regulator?

    Facebook has faced multiple privacy criticisms, how can it improve?

    1. Photo of Simon Orr

      Simon Orr

      Chief Scientific Officer, Exonar

  11. The Equifax Saga: It Could Happen Again. Don’t Let It

    Given the ongoing tensions between the US and China, it is unlikely that these government-run hacks will let up anytime soon

    1. Photo of Rami Sass

      Rami Sass

      CEO and Co-Founder of WhiteSource

  12. Power to the People

    There is still a widespread assumption that secure perimeter and air gapped networks are enough to protect critical systems.

    1. Photo of Ilan Barda

      Ilan Barda

      CEO, Radiflow

  13. The Security Misconceptions of Apple

    There are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms

    1. Photo of Jason Wudi

      Jason Wudi

      CTO, Jamf

  14. The CSI Effect Comes to Cybersecurity

    If audit logs provide all the answers, why are we still regularly hearing about cyber-attacks

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  15. Put a PIN in it: Why the Password vs. PIN Debate is Irrelevant

    The best solution: eliminating PINs and passwords altogether in favor of passwordless authentication

    1. Photo of Inbal Voitiz

      Inbal Voitiz

      VP of Marketing at Secret Double Octopus

  16. WannaCry – Please Meet #COVID19

    Will the Coronavirus bring computer and medical science together?

    1. Photo of Julian Tanner

      Julian Tanner

      Managing Partner, TUVA Partners

  17. Addressing Third Party Assessment Fatigue with Automation

    Companies are suffering from assessment fatigue

    1. Photo of Alex Hollis

      Alex Hollis

      VP, GRC Services at SureCloud

  18. Remote Workforce Security: Protecting People, Protecting the Enterprise

    Ensuring a number of top security and management practices are in play will be essential if firms are to protect their people – and the enterprise itself.

    1. Photo of Jay Ryerse

      Jay Ryerse

      CISSP, VP of Cybersecurity Initiatives at ConnectWise

  19. Building an Elegant Data Governance Solution Takes People and a Plan

    Organizations must be thoughtful in their approaches to security by building cathedrals of data governance — not just a few flimsy walls around their data kingdoms.

    1. Photo of Pete Thurston

      Pete Thurston

      Chief Product Officer and VP of Business Technology, RevCult

  20. The Missing Link in Cloud Security

    Cloud security isn't currently keeping up with the growth of cloud storage and adoption

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

What’s Hot on Infosecurity Magazine?