Infosecurity Opinions

  1. How eLearning Can Increase Company Cybersecurity Across the Board

    Its better to be proactive rather than reactive

  2. The Risk of Increase in Social Cyber Security in 2020

    One way social proof can drive positive cybersecurity behaviors is by highlighting the right that others are doing.

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  3. DevOps and Security – What’s in a Name?

    By looking at a DevOps Security approach rather than DevSecOps, security teams can use their influence and experience to their advantage

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  4. Preparing Your Enterprise For a Post-Quantum Future

    There is no easy way to know if you are behind the curve, on schedule, or moving too slowly

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  5. Knowing Your Enemy: Attack Attribution in Cybersecurity

    While you can’t predict all attacks, you can use intelligence from the past to mitigate

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  6. Do We Need More Cyber Hygiene?

    Judging from the continued news of breaches, do we ever have enough cyber hygiene?

    1. Photo of Arun Vishwanath

      Arun Vishwanath

      Researcher, Author, Technologist

  7. #HowTo Do SD-WAN Security

    Arguably SD-WAN’s greatest benefit is identifying and closing holes in an enterprise’s security.

    1. Photo of Patrick Hubbard

      Patrick Hubbard

      Head Geek, SolarWinds

  8. Life as a Crowdsourced Hacker – Why You Won’t Become a Millionaire

    It’s important to understand what you’re in for

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  9. Is This the Beginning of the End for Transport Layer Security Inspection Techniques?

    The NSA makes it clear that TLSI does have advantages

    1. Photo of Omar Yaacoubi

      Omar Yaacoubi

      CEO, Barac

  10. Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand

    Brands are unaware of who fourth parties are, and damage control becomes more challenging

    1. Photo of Chemi Katz

      Chemi Katz

      CEO and co-founder Namogoo

  11. Is TikTok a Cybersecurity Threat?

    There are concerns about TikTok, so what can we do about them?

  12. Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains

    Attackers are increasingly looking to target people while they are travelling

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  13. Why Businesses Need to Re-Think Network Monitoring in 2020

    The current approach to network security is significantly flawed on two counts

    1. Photo of Ivan Blesa

      Ivan Blesa

      Head of Product, Noble

  14. What Does the Hack Back Bill Mean to Your Business?

    There is often vagueness in the language of new bills, especially when they are still in draft form.

    1. Photo of Chris Kennedy

      Chris Kennedy

      CISO and VP of customer success at AttackIQ

  15. How the Real Business Killer is Having Nothing on the Shelves

    While ransomware is certainly a current problem for targeted businesses, downtime is a seasoned business killer

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  16. Call in the White Hats — It’s Time to Reboot External Testing

    Businesses should be cycling through new testers every so often, so that attackers can push at different doors.

    1. Photo of Bojan Simic

      Bojan Simic

      Cofounder and CTO, HYPR

  17. How Social Engineering is Changing the Insider Threat Game

    Social engineering attacks ultimately lead to a type of insider threat known as user error

    1. Peter Draper

      Technical director at Gurucul

  18. #HowTo Get the Most Out of Your Privileged Access Management Programme

    Enterprises should put thought into architecting a PAM program with a risk-based approach

    1. Photo of Anusha K.M.

      Anusha K.M.

      Product Consultant, ManageEngine

  19. Firewalls, VLANs, ACLs and Security Groups Hit a Wall: What Next?

    An advance on traditional segmentation that marries speed, innovation and improved security.

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  20. Is it Time to Resuscitate Prevention?

    Why data breaches are only inevitable if we continue to think of them as the new normal.

    1. Photo of Scott Scheferman

      Scott Scheferman

      Principal Security Technologist, SentinelOne

What’s Hot on Infosecurity Magazine?