Infosecurity Opinions

  1. How Can MSSPs Thrive in the Growing Time of Complex Cyber Threats?

    More and more enterprises are relying on third-party service providers

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  2. #HowTo Avoid Common Mistakes in Vulnerability Management

    A successful vulnerability management program is all about the reduction of business risk

    1. Photo of Brian Carey

      Brian Carey

      Consulting services manager, Rapid7

  3. The Hunt for Effective Machine Learning in Security

    The vast majority of today’s breaches root back to a failure of detection

    1. Photo of Kumar Saurabh

      Kumar Saurabh

      CEO and co-founder of LogicHub

  4. Curbing Insider Insecurity

    Cyber-criminals often weaponize ignorance in their attacks

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  5. Cloud Migration Makes an Old Data Security Problem New Again

    The current push toward digital transformation can only exacerbate the problem

    1. Photo of Gordon Smith

      Gordon Smith

      President and CEO of Sagent

  6. Fighting Fraud: Connecting the Dots with Data

    Fraud may be as old as business itself, but the business of fraud is brimming with fresh vigor

    1. Photo of Carol  Hamilton

      Carol Hamilton

      Regional Director of Compliance and Fraud Solutions – EMEA, GBG

  7. SOC 1, 2, & 3 Audit Reports, and Why You Need One

    A SOC report is the compendium of safeguards built within the control base of the data, and a check if the safeguards work

    1. Photo of Max Aulakh

      Max Aulakh

      President, Ignyte Assurance Platform

  8. Managing Non-Security Incidents with Security Tools and Policies

    What happens when an incident isn’t security related?

    1. Photo of Matt Petrosky

      Matt Petrosky

      VP of Customer Experience, GreatHorn

  9. Equifax and Capital One: What Should We Learn?

    Both were possible because of basic holes in the companies’ cyber hygiene practices

    1. Photo of Richard Melick

      Richard Melick

      Senior Technical Product Manager at Automox

  10. How Secure Is Behavioral Biometrics?

    Analysis and matching of these behavioral traits about a person form the basis of behavioral biometrics

    1. Photo of David Smith

      David Smith

      Independent Consultant

  11. Defending in the Age of Advanced Insiders

    Insiders will also have a working understanding of many of the security tools and processes in place to detect an attack

    1. Photo of Brian Vecci

      Brian Vecci

      Field CTO, Varonis

  12. Application Security Report: Urgent Need for Remediation

    Remediation rates for security flaws have been gradually declining

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  13. We’ve Been Breached! What Do You Want From Us?

    While most customers understand that breaches are inevitable, it isn’t always easy to forgive and forget

    1. Photo of Michael Bruemmer

      Michael Bruemmer

      Vice President, Experian Data Breach Resolution and Consumer Protection

  14. #HowTo Develop a Detection and Response Strategy for Email Phishing

    You need to get your employees on board to help prevent phishing

    1. Photo of Segun Onibalusi

      Segun Onibalusi

      Digital Marketing Consultant

  15. Why Understanding the User Experience is Essential to Good Security

    Security and usability have traditionally been opposing concepts.

    1. Photo of Sally Carson

      Sally Carson

      Head of Product Design and User Experience at Duo Security, now part of Cisco

  16. Bots x Humans: a Solution is Needed

    Imagine a more strange job than sitting in a room all day proving that you're a human for the purpose of a computer

    1. Photo of Steven Puddephatt

      Steven Puddephatt

      Technical Architect at GlobalDots

  17. Your Employees are Taking Your Data

    Organizations must have the ability to mitigate the risks of costly lawsuits or losing valuable intellectual property to competitors

    1. Photo of Richard Agnew

      Richard Agnew

      VP UK, I & Northern Europe, Code42

  18. Where Are All the Humans?

    Separating hype from reality

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

  19. Trust the Machine: How Security Analysts Can Relinquish Control

    Instead of spending time undertaking mundane monitoring tasks, they need to embrace automated solutions

    1. Photo of Chris Calvert

      Chris Calvert

      Co-Founder, Respond Software

  20. Thinking Outside the National Vulnerability Database Box

    Why relying on a single source of the truth is not a good idea

    1. Caleb Hightower

      Cybersecurity Research Analyst for RiskSense

What’s Hot on Infosecurity Magazine?