Infosecurity Opinions

  1. AI Puts Voice Impersonation on Steroids – Why and How Organizations can Minimize the Risks

    AI-generated voice impersonation is a reputational as well as a financial or security threat

    1. Photo of Charlie Pownall

      Charlie Pownall

      Independent reputation and communications advisor

  2. When Seeing Isn’t Believing: Deepfakes in the Digital Age

    Deepfakes are the new visual content taking the social media sphere by storm

    1. Photo of Mike Price

      Mike Price

      CTO, ZeroFOX

  3. As Attacks on Biometric Data Rise, Risk and Identity-Defined Security Become Paramount

    Unlike passwords, it’s unchangeable data

    1. Photo of Jeff Wichman

      Jeff Wichman

      Director of Incident Response, Semperis

  4. Another Data Privacy Law? No Problem

    The New York Privacy Act will be added to a long list of worldwide regulations companies must comply with, or face harsh penalties

    1. Photo of Brian Johnson

      Brian Johnson

      CEO and co-founder, DivvyCloud

  5. What is Malware Flux and How Can You Avoid it?

    Malware flux "hides" malware in two waves of a Trojan

  6. Establishing Efficient Data Governance Processes to Add Business Value

    An effective strategy for data governance will help IT and security teams to articulate the value of such a program to the C-Suite

    1. Photo of Matt Middleton-Leal

      Matt Middleton-Leal

      EMEA & APAC General Manager at Netwrix

  7. Is Continuous Authorization the New Frontier in Enterprise Security?

    Authorization is no longer a nice-to-have feature, it is an imperative

    1. Photo of Nati Hazut

      Nati Hazut

      CEO of Polyrize

  8. Debunking Five Myths about Zero Trust

    Zero Trust's evolution over the last decade have created some misconceptions

    1. Photo of Torsten George

      Torsten George

      Cybersecurity evangelist, Centrify

  9. #HowTo Combat the Insider Threat

    Insider threats can be difficult to detect, and pose a threat that businesses struggle to address

    1. Photo of Karl Lankford

      Karl Lankford

      Director of Solutions Engineering, Beyond Trust

  10. What is the Right Response to the Extended PSD2 Deadline?

    Retailers have been granted an 18-month extension for SCA compliance, delaying implementation to March 2021

    1. Photo of Michael Reitblat

      Michael Reitblat

      Co-Founder and CEO of Forter

  11. Why Content Services Platforms Should Be ‘Need-To-Know’ Security Ready

    Need-to-know security is an essential part of protecting sensitive enterprise information

    1. Photo of Ian Raine

      Ian Raine

      Vice President of Product Management at iManage

  12. The CFO’s Perspective: Steps to Quantifying Cyber Risk

    A CFO's steps to better security decisions

    1. Bill Gadala

      Chief Financial Officer, VERA

  13. Attackers Will Get in, the Trick is to Kick Them Out ASAP

    Despite increased investments, organizations are still suffering costly breaches

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  14. PSD2 - Why You Need to Get Used to the QWAC

    QWAC standards are partly based on the CA/Browser Forum’s standard for Extended Validation certificates

    1. Photo of Roman Brunner

      Roman Brunner

      Managing Director Emerging Markets – Europe, DigiCert

  15. #GartnerSEC: How to Keep Your Job After a Cyber-Attack

    Overcoming these challenges will make an organization’s security program more defensible

    1. Photo of Paul Proctor

      Paul Proctor

      Distinguished Research VP, Gartner

  16. Why Enclaves are Taking over the Security World

    This has the potential to become the fundamental security building blocks for the enterprise

    1. Photo of Nishank  Vaish

      Nishank Vaish

      Senior Product Manager, Fortanix

  17. Crowdsourced Security is Redefining the Gig Economy, and Not in a Good Way

    Why crowdsourced security is a race to the bottom

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  18. Keeping Data Secure in the Oil and Gas Industry

    The smallest attack on this sector could result in devastating effects.

    1. Jerry Askar

      Managing Director Middle East, Levant & Africa, Certes Networks

  19. Establishing Identity in the Digital Economy

    The rise of digital and mobile usage has increased the difficulty in verifying identity

    1. Photo of Yossi Zekri

      Yossi Zekri

      President & CEO, Acuant

  20. What’s a Next Generation VPN with Zero-Trust Access?

    SDPs have a big advantage over the VPNs of old

    1. Photo of Etay Bogner

      Etay Bogner

      VP of Zero-Trust Products, Proofpoint

What’s Hot on Infosecurity Magazine?