Infosecurity Opinions

  1. Your Best Bet for a Safe Ride? Buckle up With a Best Practice Security Framework

    How will the ‘Good Guys’ respond? In two ways: ‘Innovation and Frameworks.’

  2. Finding and Mentoring Your Next Key Security Hire

    Security talent - the hidden treasure trove of the next great security professional within your company.

    1. Photo of Michael Coates

      Michael Coates

      CEO, Altitude Networks

  3. Securing Backups in an Automated Data Protection System

    Securing backups from ransomware and authorized access in an automated data protection system

    1. Photo of Laz Vekiarides

      Laz Vekiarides

      CTO of ClearSky Data

  4. #HowTo Put Together an Effective Information Security Policy

    Do not think that anything is too obvious to leave out of your policy

    1. Photo of Ashley Halsey

      Ashley Halsey

      Professional writer and security expert

  5. Cybersecurity Must Do More Than Prevention, Real-Time Metadata Is the First Step

    Rich metadata gathered from your network can capture more than 90% of the useful data that a full packet capture system would.

    1. Photo of Abdul Rahman

      Abdul Rahman

      Chief Scientist, Fidelis Cybersecurity

  6. Using Graph Search Engines and High Performance Servers to Find Malware Patterns

    Threat detection tools face formidable challenges, particularly when analyzing massive data sets

    1. Photo of James Rottsolk

      James Rottsolk

      President and CEO of Trovares

  7. What the Post-API Economy Will Look Like

    APIs are beginning to struggle with capacity and security issues

    1. Photo of Brian Platz

      Brian Platz

      Co-CEO, Fluree

  8. Consumer Apps: the New-Age Weapon

    A mobile-centric zero trust approach also provides on-device detection and remediation of threats.

    1. Photo of Simon Biddiscombe

      Simon Biddiscombe

      CEO, MobileIron

  9. Rely on Continuous Improvement and Not Biases to Apply Cybersecurity Best Practices

    How do we learn from our mistakes instead of continually repeating them?

    1. Photo of Alex Jinivizian

      Alex Jinivizian

      Vice President Strategy & Corporate Development, eSentire

  10. A Digital Solution to Supply Chain Security

    Why businesses should secure and manage third party access points by digitizing identity

    1. Photo of Simon Wood

      Simon Wood

      CEO, Ubisecure

  11. Real ID Driver License Push Could Mean Real Headaches for US State Agencies

    Real ID is one of the biggest data-gathering initiatives to take place recently

    1. Photo of Brian Vecci

      Brian Vecci

      Field CTO, Varonis

  12. Software Security Witching Hour is Upon us

    Which vulnerabilities are lurking in the shadows?

    1. Photo of Meera Rao

      Meera Rao

      Senior Principal Consultant, Synopsys

  13. Effective Encryption Protects Data When it's Most Vulnerable

    Remember that data exists in essentially three states: at-rest, in-motion, and in-use

    1. Photo of Jerry Ray

      Jerry Ray

      COO, SecureAge

  14. How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?

    More and more enterprises are relying on third-party service providers

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  15. #HowTo Avoid Common Mistakes in Vulnerability Management

    A successful vulnerability management program is all about the reduction of business risk

    1. Photo of Brian Carey

      Brian Carey

      Consulting services manager, Rapid7

  16. The Hunt for Effective Machine Learning in Security

    The vast majority of today’s breaches root back to a failure of detection

    1. Photo of Kumar Saurabh

      Kumar Saurabh

      CEO and co-founder of LogicHub

  17. Curbing Insider Insecurity

    Cyber-criminals often weaponize ignorance in their attacks

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  18. Cloud Migration Makes an Old Data Security Problem New Again

    The current push toward digital transformation can only exacerbate the problem

    1. Photo of Gordon Smith

      Gordon Smith

      President and CEO of Sagent

  19. Fighting Fraud: Connecting the Dots with Data

    Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor

    1. Photo of Carol  Hamilton

      Carol Hamilton

      Regional Director of Compliance and Fraud Solutions – EMEA, GBG

  20. SOC 1, 2, & 3 Audit Reports, and Why You Need One

    A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work

    1. Photo of Max Aulakh

      Max Aulakh

      President, Ignyte Assurance Platform

What’s Hot on Infosecurity Magazine?