Infosecurity Opinions

  1. The Most Influential Security Frameworks of All Time

    Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

    1. Photo of Howard Dawson

      Howard Dawson

      Tech Writer, SurfShark

  2. Safety and Security in Industry 4.0 – Are You Ready?

    A fundamental challenge remains about how advances should be secured

    1. Photo of Nigel Stanley

      Nigel Stanley

      CTO for OT and Industrial Cybersecurity, TUV Rheinland

  3. The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust

    The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

    1. Photo of Sean T. Horner

      Sean T. Horner

      Director at The Chertoff Group

  4. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

  5. Performance Anxiety and the Inability to Stop Access Threats

    The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  6. Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success

    With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  7. Why the Real Estate Industry is a Prime Target for Attackers

    Why are cyber-criminals so heavily targeting the real estate market?

    1. Photo of Ryan Heidorn

      Ryan Heidorn

      Managing partner and co-founder at Steel Root

    2. Photo of EJ Whaley

      EJ Whaley

      Solutions Engineer, GreatHorn

  8. Why Network Visibility is at the Heart of Digital Transformation

    To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution

    1. Photo of Shane Buckley

      Shane Buckley

      President and COO, Gigamon

  9. Governing Over Critical Data in the Internet of Things

    What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?

    1. Photo of Alex Willis

      Alex Willis

      Vice President, Global Technical Solutions, BlackBerry

  10. The Three Hidden Dangers of Working With Third-Party Vendors

    We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes

    1. Photo of Matt Kunkel

      Matt Kunkel

      CEO, LogicGate

  11. The Security Nightmare of Formjacking

    Staying ahead of trends and the security game, hackers have latched onto another high-return attack

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  12. #HowTo Vet AI Threat Detection Solutions for Stronger Cybersecurity

    A behavioral analytics-based approach looks at motives rather than tactics

    1. Photo of Yossi Naar

      Yossi Naar

      Chief Visionary Officer & Co-Founder, Cybereason

  13. The Role of Data in Managing Application Risk

    Risk assessment and vulnerability reporting presents the first significant data management challenge faced by appsec programs

    1. Photo of Syed Abdur Rahman

      Syed Abdur Rahman

      VP, Product Management & Marketing, Brinqa

  14. The Five Pillars of Actionable Cloud Security

    Designing and deploying an actionable cloud security framework that follows industry best practices (in sequence) gives companies the best chance for success.

    1. Photo of Tim Jefferson

      Tim Jefferson

      VP of public cloud at Barracuda Networks

  15. #HowTo Enable Effective Security Awareness Training

    Steps to take to enable efficient security awareness

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. Protecting Service Revenue from Hackers: Cybersecurity for Connected Maintenance Apps

    Modern maintenance apps provide on-site history, diagnostics, performance measurement and tunability of systems

    1. Photo of Mark Hearn

      Mark Hearn

      Director of IoT Security and Business Development, Irdeto

  17. Apps: Gateway to Your Private Data

    For companies that store personal data, there is a hefty burden of responsibility.

    1. Photo of Terry Ray

      Terry Ray

      SVP, Imperva

  18. What Should Frighten us about AI-Based Malware?

    AI machine learning (ML) security powered by algorithms was intended to defeat cyber doom and gloom

    1. Photo of Steve Rymell

      Steve Rymell

      Head of Technology, Airbus CyberSecurity

  19. The Brexit Threat: Chaos, Confusion and Con Men

    Confusion brought about by Brexit is opening up more opportunities for cyber-criminals

    1. Photo of Guy Bunker

      Guy Bunker

      SVP of Products, Clearswift

  20. Vendors Need to Stop Fear Selling, it’s Damaging the Whole Industry

    FUD selling is frustrating, unhelpful and damaging

    1. Photo of Aidan Simister

      Aidan Simister

      CEO, Lepide

What’s hot on Infosecurity Magazine?