Infosecurity Opinions

  1. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  2. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  3. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  4. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  5. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  6. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

  7. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  8. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  9. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  10. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  11. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  12. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

  13. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  14. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  15. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

  16. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  17. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  18. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

  19. Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

    63% of SMBs believing that cloud storage providers should do more to protect their data

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  20. Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan

    Well managed data is easier to locate, utilize and update with the latest security policies

    1. Photo of Jasmit Sagoo

      Jasmit Sagoo

      Senior Director, Head of Technology UK&I, Veritas Technologies

What’s Hot on Infosecurity Magazine?