Infosecurity Opinions

  1. My Voice is My Ultimate Password

    How Biometrics Can Keep Hackers At Bay

    1. Photo of Piergiorgio Vittori

      Piergiorgio Vittori

      Global Development Director at Spitch

  2. Why Modern Identity Verification is Crucial in Today’s Threat Landscape

    Multiple digital identity checks for remote verification will help increase pass rates

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  3. Staying on the Cutting Edge of Cybersecurity

    With edge computing, the application and its data, are distributed across multiple locations

    1. Photo of Andrew Bargery

      Andrew Bargery

      Solutions Architect, F5

  4. Next Generation Cyber: Malware-Free Attacks

    The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  5. System Hardening, and Why it’s Harder Than it Looks

    The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  6. Pandora’s Box Is Open – AI Won’t Get Back In

    The unfolding AI vs AI cybersecurity war

    1. Photo of Tom Ilube

      Tom Ilube

      CEO of Crossword Cybersecurity

  7. The Case for Security Instrumentation: Understanding and Measuring Cyber Risk

    So what can CIOs do to better understand and address these gaps

    1. Photo of Brian Contos

      Brian Contos

      CISO & VP, Technology Innovation, Verodin

  8. Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation

    We in IT are often guilty of conflating information with wisdom

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  9. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  10. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  11. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  12. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  13. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  14. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  15. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  16. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

  17. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  18. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  19. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  20. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

What’s Hot on Infosecurity Magazine?