Infosecurity Opinions

  1. SSO Out of Reach: SaaS Pricing Strategies Weaken Customers’ Security

    Unfortunately, many SaaS providers enable SSO only for “enterprise” customers

    1. Photo of Lenny Zeltser

      Lenny Zeltser

      CISO, Axonius

  2. CISO - Don't Take it Personally But Make it Personal

    You need a lot more than technical knowledge and the ability to design roadmaps and execute projects

    1. Dror Hevlin

      Chief Information Security Officer, SolarEdge

  3. Address New Risks Without Adding Complexity

    There’s no ‘one size fits all’ when it comes to securing the multi-generation enterprise

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  4. Credit Rating Agencies are Evaluating Cybersecurity Risks, So Should You

    The right cybersecurity leader can interpret potential security issues for the board and anticipate the company's security needs

    1. Photo of Jeremy Haas

      Jeremy Haas

      Chief Security Officer at LookingGlass Cyber Solutions

  5. Managed Security Services Shouldn’t Scare the SMB

    The MSSP model is now in financial reach for the SMB

    1. Photo of Mark Carl

      Mark Carl

      CEO, ControlScan

  6. Funerals for Glaciers and Antibiotics: Is Anti-Virus Next?

    Is anti-virus facing the same future as the Okjökull glacier

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  7. Extending the “Circle of Trust” with Confidential Computing

    When an application starts to run, its data is vulnerable to a variety of attacks

    1. Photo of Richard Searle

      Richard Searle

      Senior Security Architect at Fortanix

  8. How AI is Revolutionizing the Banking Sector

    AI is becoming important for all businesses that rely heavily on data

    1. Oliver Smith

      Tech Writer, Shufti Pro

  9. #HowTo Migrate from SharePoint

    Companies should consider sparing themselves the headache of a future full of migrations by undergoing one migration to a cloud-based system

    1. Photo of Dave Jones

      Dave Jones

      VP of Marketing at AODocs

  10. Demand More Achievement in Cybersecurity

    We need automated measures of effectiveness relative to operationalized cybersecurity

    1. Photo of Jesse K. Dean

      Jesse K. Dean

      Senior Director of Solutionsm TDI

  11. Why Password-based Single Sign-On is a Bad Idea

    It all comes down to trust.

    1. Photo of Ori Eisen

      Ori Eisen

      CEO of Trusona

  12. The Internet Is Growing, and so Is Your Attack Surface

    A company’s attack surface sprawls across the open internet, making attack surface management a critical component

    1. Photo of Dan Schoenbaum

      Dan Schoenbaum

      President and COO of RiskIQ

  13. The Three Cyber Attacks Ruining Your Holiday Spirit

    Three types of cyber attack to watch out for during the holiday season

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  14. Calculating the True Cost of a SOC

    Under-staffed IT and security teams can create more security risk than most companies realize.

    1. Photo of Alex Jinivizian

      Alex Jinivizian

      Vice President Strategy & Corporate Development, eSentire

  15. Expanding Biometric Use in Government

    Biometrics, similar to passwords, PINs and bankcards, are a credential

    1. Photo of George Avetisov

      George Avetisov

      CEO of HYPR

  16. Illuminate Dark Data and Avoid Severe Security Risks

    Nearly 90% of all data is dark, meaning it’s sitting unused by the organizations that collect it.

    1. Photo of Pete Thurston

      Pete Thurston

      Chief Product Officer and VP of Business Technology, RevCult

  17. A Tricky Transition: Why Organizations Struggle with Secure, Multi-Cloud Migrations

    On average, they are leveraging nearly five clouds.

    1. Photo of Onkar Birk

      Onkar Birk

      SVP, Product Strategy & Engineering, Alert Logic

  18. Identifying and Defending Against Harmful Content

    ‘Not Safe For Work’ content is a more prevalent and complex issue than ever before.

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  19. Risk in Retail: Staying on the Right Side of the Headlines

    How can retailers survive in a connected and risky world?

    1. Photo of Todd Wade

      Todd Wade

      Principal Consultant, CRMG

  20. A Familiar Foe — Preventing Ransomware’s Resurgence

    For hackers able to identify and infiltrate systems that are lagging behind, however, the payday is still high

    1. Photo of Kris Lahiri

      Kris Lahiri

      CSO, Egnyte

What’s Hot on Infosecurity Magazine?