Infosecurity Opinions

  1. Managing Non-Security Incidents with Security Tools and Policies

    What happens when an incident isn’t security related?

    1. Photo of Matt Petrosky

      Matt Petrosky

      VP of Customer Experience, GreatHorn

  2. Equifax and Capital One: What Should We Learn?

    Both were possible because of basic holes in the companies’ cyber hygiene practices

    1. Photo of Richard Melick

      Richard Melick

      Senior Technical Product Manager at Automox

  3. How Secure Is Behavioral Biometrics?

    Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics

    1. Photo of David Smith

      David Smith

      Independent Consultant

  4. Defending in the Age of Advanced Insiders

    Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack

    1. Photo of Brian Vecci

      Brian Vecci

      Field CTO, Varonis

  5. Application Security Report: Urgent Need for Remediation

    Remediation rates for security flaws have been gradually declining

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  6. We’ve Been Breached! What Do You Want From Us?

    While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

    1. Photo of Michael Bruemmer

      Michael Bruemmer

      Vice President, Experian Data Breach Resolution and Consumer Protection

  7. #HowTo Develop a Detection and Response Strategy for Email Phishing

    You need to get your employees on board to help prevent phishing

    1. Photo of Segun Onibalusi

      Segun Onibalusi

      Digital Marketing Consultant

  8. Why Understanding the User Experience is Essential to Good Security

    Security and usability have traditionally been opposing concepts.

    1. Photo of Sally Carson

      Sally Carson

      Head of Product Design and User Experience at Duo Security, now part of Cisco

  9. Bots x Humans: a Solution is Needed

    Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

    1. Photo of Steven Puddephatt

      Steven Puddephatt

      Technical Architect at GlobalDots

  10. Your Employees are Taking Your Data

    Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

    1. Photo of Richard Agnew

      Richard Agnew

      VP UK, I & Northern Europe, Code42

  11. Where Are All the Humans?

    Separating hype from reality

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

  12. Trust the Machine: How Security Analysts Can Relinquish Control

    Instead of spending time undertaking mundane monitoring tasks, they need to embrace automated solutions

    1. Photo of Chris Calvert

      Chris Calvert

      Co-Founder, Respond Software

  13. Thinking Outside the National Vulnerability Database Box

    Why relying on a single source of the truth is not a good idea

    1. Caleb Hightower

      Cybersecurity Research Analyst for RiskSense

  14. How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats

    The threat landscape is changing, but so is the security tools market

    1. Photo of John Norden

      John Norden

      Vice president of engineering, Infocyte

  15. Securing Linux Systems in a New Vulnerable World

    Securing Linux-based systems and devices has become a pressing challenge for developers and device manufacturers

    1. Photo of Arlen Baker

      Arlen Baker

      Chief Security Architect, Wind River

  16. Is IAM a Pink Elephant in Businesses?

    IAM programs should ensure the risk is clear to help clients build a complete, security-rich solution

    1. Photo of Evelyn Anderson

      Evelyn Anderson

      Senior Technical Staff Member, IBM

  17. How Smart are Smart Cities? Balancing Innovation with Privacy

    The more connected devices a smart city employs, the greater the risk to individual privacy

    1. Photo of Charles Eagan

      Charles Eagan

      CTO, BlackBerry

  18. #HowTo: Avoid Common Data Discovery Pitfalls

    Avoiding common and foundational issues will allow organizations to maximize their investment in data discovery

    1. Photo of Jan van Vliet

      Jan van Vliet

      VP and GM EMEA

  19. Breaking Bad – Are You Ready to Lawfully Intercept TLS 1.3?

    TLS 1.3 is more secure, offers faster handshaking with lower latency

    1. Photo of David Peters

      David Peters

      CTO, ANSecurity

  20. Mind the Gap – Measuring the Skills of a Security Team

    Until a technology audit is complete, CISOs are blind to the gaps in their organization’s armor

    1. Photo of James Hadley

      James Hadley

      CEO, Immersive Labs

What’s Hot on Infosecurity Magazine?