Infosecurity Opinions

  1. Reinventing the Role of the Tier 1 SOC Analyst

    Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  2. What Actually IS a Cyber Range, and How Has It Evolved?

    A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how

    1. Photo of Debbie Gordon

      Debbie Gordon

      CEO and Founder of Cloud Range Cyber

  3. Automating Security With Intelligence

    Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.

    1. Photo of Karen Levy

      Karen Levy

      Vice President, Product and Client Marketing, Recorded Future

  4. Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments

    Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.

    1. Photo of Chris Sherry

      Chris Sherry

      Regional Vice President EMEA, Forescout

  5. Preparing for Tomorrow: Cybersecurity in a Remote World

    The cost effective option of permanent remote working

    1. Photo of Chris Jenkins

      Chris Jenkins

      Sales Director, UK and Ireland, Proficio

  6. Is a Wiped Computer Truly Wiped?

    Just because data appears to be gone doesn’t mean that it really is

    1. Mike Savitz

      Principal Consultant, The Crypsis Group

  7. Why SASE Can be Your Solution in a Time of Uncertainty

    With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption

    1. Photo of Dave Martin

      Dave Martin

      Senior Director, Product Management of Threat Response at Open Systems

  8. The Key to Successfully Managing Cyber Risk: Speed

    No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.

    1. Photo of Grant Moerschel

      Grant Moerschel

      VP Product Marketing, SentinelOne

  9. RE: Thinking Email Security

    Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed

    1. Photo of Mariana  Pereira

      Mariana Pereira

      Director of Email Security Products, Darktrace

  10. The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives

    Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  11. Lessons From the World’s Crash-Course into Telecommuting During #COVID19

    A few weeks into the Covid-19 disruptions, some first-hand observations from the field that apply to organizations globally

    1. Photo of Shane Stephens

      Shane Stephens

      Senior Engineer, Forescout

  12. Zelle: A New Door Opens, But is Crime Walking In?

    Zelle fraud is the fastest growing area of account takeover fraud in the U.S. banking sector.

    1. Photo of Uri Rivner

      Uri Rivner

      Chief Cyber Officer, BioCatch

  13. #HowTo Secure Distributed Cloud Systems in Enterprise Environments

    How can organizations secure distributed cloud systems while maintaining efficiency?

    1. Photo of Soumik Sarkar

      Soumik Sarkar

      Chief Technology Officer & Co-Founder, Crosscode

  14. Steps to Implementing Voice Authentication and Securing Biometric Data

    What are the steps to implementing a voice verification system, and how should the voiceprint data be secured?

    1. Photo of Miroslav Jirků

      Miroslav Jirků

      VP of Marketing, Phonexia

  15. Debunking Myths about Quantum Cryptography

    Given how much data is stolen from U.S. industry and government, quantum could be a huge problem.

    1. Photo of John Prisco

      John Prisco

      CEO of Quantum Xchange

  16. How Can Facebook Avoid the Wrath of the Regulator?

    Facebook has faced multiple privacy criticisms, how can it improve?

    1. Photo of Simon Orr

      Simon Orr

      Chief Scientific Officer, Exonar

  17. Top Ways to Guard Against Work-from-Home Phishing Threats

    Best practices that can help raise awareness of potential phishing techniques and other scams

    1. Photo of A.N. Ananth

      A.N. Ananth

      Chief Strategy Officer at Netsurion

  18. The Equifax Saga: It Could Happen Again. Don’t Let It

    Given the ongoing tensions between the US and China, it is unlikely that these government-run hacks will let up anytime soon

    1. Photo of Rami Sass

      Rami Sass

      CEO and Co-Founder of WhiteSource

  19. Power to the People

    There is still a widespread assumption that secure perimeter and air gapped networks are enough to protect critical systems.

    1. Photo of Ilan Barda

      Ilan Barda

      CEO, Radiflow

  20. The Security Misconceptions of Apple

    There are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms

    1. Photo of Jason Wudi

      Jason Wudi

      CTO, Jamf

What’s Hot on Infosecurity Magazine?