Infosecurity Opinions

  1. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  2. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  3. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  4. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  5. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  6. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  7. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  8. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

  9. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  10. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  11. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  12. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  13. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  14. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

  15. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  16. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  17. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

  18. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  19. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  20. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

What’s Hot on Infosecurity Magazine?