Infosecurity Opinions

  1. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  2. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  3. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

  4. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  5. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  6. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

  7. Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

    63% of SMBs believing that cloud storage providers should do more to protect their data

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  8. Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan

    Well managed data is easier to locate, utilize and update with the latest security policies

    1. Photo of Jasmit Sagoo

      Jasmit Sagoo

      Senior Director, Head of Technology UK&I, Veritas Technologies

  9. Privacy and Data Protection in Multimedia Apps

    The processing of sensitive data through multimedia apps poses significant risks to data security and privacy

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  10. Cybersecurity – It Takes an Engineer to Catch an Engineer

    How to use cyber-criminal behavior pattern knowledge to our advantage

    1. Photo of Elias Haddad

      Elias Haddad

      ICT Business Analyst

  11. The Most Influential Security Frameworks of All Time

    Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

    1. Photo of Howard Dawson

      Howard Dawson

      Tech Writer, SurfShark

  12. Safety and Security in Industry 4.0 – Are You Ready?

    A fundamental challenge remains about how advances should be secured

    1. Photo of Nigel Stanley

      Nigel Stanley

      CTO for OT and Industrial Cybersecurity, TUV Rheinland

  13. The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust

    The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

    1. Photo of Sean T. Horner

      Sean T. Horner

      Director at The Chertoff Group

  14. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

  15. Performance Anxiety and the Inability to Stop Access Threats

    The impact from access threats has increased, users feeling an increased impact from access security incidents in comparison with a year ago

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  16. Security Operations Centres and the Cloud – why Company-to-Company Collaboration is Key to Success

    With more systems deployed in the cloud, SIEM deployments have to cope with many more different sources of data

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  17. Why the Real Estate Industry is a Prime Target for Attackers

    Why are cyber-criminals so heavily targeting the real estate market?

    1. Photo of Ryan Heidorn

      Ryan Heidorn

      Managing partner and co-founder at Steel Root

    2. Photo of EJ Whaley

      EJ Whaley

      Solutions Engineer, GreatHorn

  18. Why Network Visibility is at the Heart of Digital Transformation

    To execute digital transformation, companies must see, manage and secure the digital applications at the heart of their evolution

    1. Photo of Shane Buckley

      Shane Buckley

      President and COO, Gigamon

  19. Governing Over Critical Data in the Internet of Things

    What are the main challenges that government entities face, and how can they better secure their IoT devices and endpoints?

    1. Photo of Alex Willis

      Alex Willis

      Vice President, Global Technical Solutions, BlackBerry

  20. The Three Hidden Dangers of Working With Third-Party Vendors

    We may be in an era of digital transformation, but inefficient, manual operations still haunt organizations with weak processes

    1. Photo of Matt Kunkel

      Matt Kunkel

      CEO, LogicGate

What’s Hot on Infosecurity Magazine?