Infosecurity Opinions

  1. Counting on Quantitative Cyber Risk

    The perceived importance of cyber risk has almost tripled in five years, but the expertise and technology has not kept pace

    1. Photo of Paul Stokes

      Paul Stokes

      Co-founder and CEO of Prevalent AI and the Managed Security Forum

  2. Defining KPIs for ISO 27001

    Companies need strong cases for updating their equipment or acquiring new technology

    1. Photo of Rhand Leal

      Rhand Leal

      ISO 27001 Expert

  3. Why Managed Service Providers Need to Help with Passwords

    Bad password habits directly pose a threat to the defense of networks, devices and users

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  4. Why IT Security Hygiene is so Crucial for Financial Services Firms

    Many IT and security leaders are juggling business priorities and their own internal security requirements

    1. Photo of Chris Hodson

      Chris Hodson

      CISO, Tanium

  5. Is Shadow IT Really the Perilous Threat It's Made Out to Be?

    It's difficult for administrators to secure what they don't know exists

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  6. Gearing up for an AI Revolution in Access Modelling

    Think of a role as a label that we attach to an identifiable access pattern

    1. Photo of Mo Badawy

      Mo Badawy

      Principal Data Scientist, SailPoint

    2. Photo of Jostine Ho

      Jostine Ho

      Senior Data Scientist, SailPoint

  7. My Voice is My Ultimate Password

    How Biometrics Can Keep Hackers At Bay

    1. Photo of Piergiorgio Vittori

      Piergiorgio Vittori

      Global Development Director at Spitch

  8. Why Modern Identity Verification is Crucial in Today’s Threat Landscape

    Multiple digital identity checks for remote verification will help increase pass rates

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  9. Staying on the Cutting Edge of Cybersecurity

    With edge computing, the application and its data, are distributed across multiple locations

    1. Photo of Andrew Bargery

      Andrew Bargery

      Solutions Architect, F5

  10. Next Generation Cyber: Malware-Free Attacks

    The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  11. System Hardening, and Why it’s Harder Than it Looks

    The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  12. Pandora’s Box Is Open – AI Won’t Get Back In

    The unfolding AI vs AI cybersecurity war

    1. Photo of Tom Ilube

      Tom Ilube

      CEO of Crossword Cybersecurity

  13. The Case for Security Instrumentation: Understanding and Measuring Cyber Risk

    So what can CIOs do to better understand and address these gaps

    1. Photo of Brian Contos

      Brian Contos

      CISO & VP, Technology Innovation, Verodin

  14. Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation

    We in IT are often guilty of conflating information with wisdom

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  15. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  16. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  17. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  18. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  19. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  20. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

What’s Hot on Infosecurity Magazine?