Infosecurity Opinions

  1. Staying on the Cutting Edge of Cybersecurity

    With edge computing, the application and its data, are distributed across multiple locations

    1. Photo of Andrew Bargery

      Andrew Bargery

      Solutions Architect, F5

  2. Next Generation Cyber: Malware-Free Attacks

    The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  3. System Hardening, and Why it’s Harder Than it Looks

    The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  4. Pandora’s Box Is Open – AI Won’t Get Back In

    The unfolding AI vs AI cybersecurity war

    1. Photo of Tom Ilube

      Tom Ilube

      CEO of Crossword Cybersecurity

  5. The Case for Security Instrumentation: Understanding and Measuring Cyber Risk

    So what can CIOs do to better understand and address these gaps

    1. Photo of Brian Contos

      Brian Contos

      CISO & VP, Technology Innovation, Verodin

  6. Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation

    We in IT are often guilty of conflating information with wisdom

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  7. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  8. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  9. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  10. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  11. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  12. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  13. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  14. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

  15. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  16. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  17. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  18. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  19. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  20. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

What’s Hot on Infosecurity Magazine?