Infosecurity Opinions

  1. Thinking Outside the National Vulnerability Database Box

    Why relying on a single source of the truth is not a good idea

    1. Caleb Hightower

      Cybersecurity Research Analyst for RiskSense

  2. How MSSPs Can Thrive in “Interesting Times” of Growing, Complex Cyber Threats

    The threat landscape is changing, but so is the security tools market

    1. Photo of John Norden

      John Norden

      Vice president of engineering, Infocyte

  3. Securing Linux Systems in a New Vulnerable World

    Securing Linux-based systems and devices has become a pressing challenge for developers and device manufacturers

    1. Photo of Arlen Baker

      Arlen Baker

      Chief Security Architect, Wind River

  4. Is IAM a Pink Elephant in Businesses?

    IAM programs should ensure the risk is clear to help clients build a complete, security-rich solution

    1. Photo of Evelyn Anderson

      Evelyn Anderson

      Senior Technical Staff Member, IBM

  5. How Smart are Smart Cities? Balancing Innovation with Privacy

    The more connected devices a smart city employs, the greater the risk to individual privacy

    1. Photo of Charles Eagan

      Charles Eagan

      CTO, BlackBerry

  6. #HowTo: Avoid Common Data Discovery Pitfalls

    Avoiding common and foundational issues will allow organizations to maximize their investment in data discovery

    1. Photo of Jan van Vliet

      Jan van Vliet

      VP and GM EMEA

  7. Breaking Bad – Are You Ready to Lawfully Intercept TLS 1.3?

    TLS 1.3 is more secure, offers faster handshaking with lower latency

    1. Photo of David Peters

      David Peters

      CTO, ANSecurity

  8. Mind the Gap – Measuring the Skills of a Security Team

    Until a technology audit is complete, CISOs are blind to the gaps in their organization’s armor

    1. Photo of James Hadley

      James Hadley

      CEO, Immersive Labs

  9. AI Puts Voice Impersonation on Steroids – Why and How Organizations can Minimize the Risks

    AI-generated voice impersonation is a reputational as well as a financial or security threat

    1. Photo of Charlie Pownall

      Charlie Pownall

      Independent reputation and communications advisor

  10. When Seeing Isn’t Believing: Deepfakes in the Digital Age

    Deepfakes are the new visual content taking the social media sphere by storm

    1. Photo of Mike Price

      Mike Price

      CTO, ZeroFOX

  11. As Attacks on Biometric Data Rise, Risk and Identity-Defined Security Become Paramount

    Unlike passwords, it’s unchangeable data

    1. Photo of Jeff Wichman

      Jeff Wichman

      Director of Incident Response, Semperis

  12. Another Data Privacy Law? No Problem

    The New York Privacy Act will be added to a long list of worldwide regulations companies must comply with, or face harsh penalties

    1. Photo of Brian Johnson

      Brian Johnson

      CEO and co-founder, DivvyCloud

  13. What is Malware Flux and How Can You Avoid it?

    Malware flux "hides" malware in two waves of a Trojan

  14. Establishing Efficient Data Governance Processes to Add Business Value

    An effective strategy for data governance will help IT and security teams to articulate the value of such a program to the C-Suite

    1. Photo of Matt Middleton-Leal

      Matt Middleton-Leal

      EMEA & APAC General Manager at Netwrix

  15. Is Continuous Authorization the New Frontier in Enterprise Security?

    Authorization is no longer a nice-to-have feature, it is an imperative

    1. Photo of Nati Hazut

      Nati Hazut

      CEO of Polyrize

  16. Debunking Five Myths about Zero Trust

    Zero Trust's evolution over the last decade have created some misconceptions

    1. Photo of Torsten George

      Torsten George

      Cybersecurity evangelist, Centrify

  17. #HowTo Combat the Insider Threat

    Insider threats can be difficult to detect, and pose a threat that businesses struggle to address

    1. Photo of Karl Lankford

      Karl Lankford

      Director of Solutions Engineering, Beyond Trust

  18. What is the Right Response to the Extended PSD2 Deadline?

    Retailers have been granted an 18-month extension for SCA compliance, delaying implementation to March 2021

    1. Photo of Michael Reitblat

      Michael Reitblat

      Co-Founder and CEO of Forter

  19. Why Content Services Platforms Should Be ‘Need-To-Know’ Security Ready

    Need-to-know security is an essential part of protecting sensitive enterprise information

    1. Photo of Ian Raine

      Ian Raine

      Vice President of Product Management at iManage

  20. The CFO’s Perspective: Steps to Quantifying Cyber Risk

    A CFO's steps to better security decisions

    1. Bill Gadala

      Chief Financial Officer, VERA

What’s Hot on Infosecurity Magazine?