Infosecurity Opinions

  1. Why Managed Service Providers Need to Help with Passwords

    Bad password habits directly pose a threat to the defense of networks, devices and users

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  2. Why IT Security Hygiene is so Crucial for Financial Services Firms

    Many IT and security leaders are juggling business priorities and their own internal security requirements

    1. Photo of Chris Hodson

      Chris Hodson

      CISO, Tanium

  3. Is Shadow IT Really the Perilous Threat It's Made Out to Be?

    It's difficult for administrators to secure what they don't know exists

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  4. Gearing up for an AI Revolution in Access Modelling

    Think of a role as a label that we attach to an identifiable access pattern

    1. Photo of Mo Badawy

      Mo Badawy

      Principal Data Scientist, SailPoint

    2. Photo of Jostine Ho

      Jostine Ho

      Senior Data Scientist, SailPoint

  5. My Voice is My Ultimate Password

    How Biometrics Can Keep Hackers At Bay

    1. Photo of Piergiorgio Vittori

      Piergiorgio Vittori

      Global Development Director at Spitch

  6. Why Modern Identity Verification is Crucial in Today’s Threat Landscape

    Multiple digital identity checks for remote verification will help increase pass rates

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  7. Staying on the Cutting Edge of Cybersecurity

    With edge computing, the application and its data, are distributed across multiple locations

    1. Photo of Andrew Bargery

      Andrew Bargery

      Solutions Architect, F5

  8. Next Generation Cyber: Malware-Free Attacks

    The rise in malware-free attacks is particularly troubling because fossilized cybersecurity solutions have proven ineffective

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  9. System Hardening, and Why it’s Harder Than it Looks

    The two key principles of system hardening are to remove unnecessary function and apply secure configuration settings

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  10. Pandora’s Box Is Open – AI Won’t Get Back In

    The unfolding AI vs AI cybersecurity war

    1. Photo of Tom Ilube

      Tom Ilube

      CEO of Crossword Cybersecurity

  11. The Case for Security Instrumentation: Understanding and Measuring Cyber Risk

    So what can CIOs do to better understand and address these gaps

    1. Photo of Brian Contos

      Brian Contos

      CISO & VP, Technology Innovation, Verodin

  12. Staying Ahead of the Game: Cyber Wisdom is Rooted in Preparation

    We in IT are often guilty of conflating information with wisdom

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  13. Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector

    By maintaining visibility and control over how documents are shared in, law firms can circumvent the exposure of sensitive information

    1. Photo of Richard Walters

      Richard Walters

      CTO of CensorNet

  14. The Perils of Sneaking up the Supply Chain

    Across the supply chain, partner security is a serious threat

    1. Photo of Mark Belgrove

      Mark Belgrove

      Head of Cyber Consultancy at Exponential-e

  15. Forever Day: The Threat that Never Ends

    Even end-of-service-time equipment should get a patch if the company is able to provide it

    1. Photo of Leigh-Anne Galloway

      Leigh-Anne Galloway

      Cyber Security Resilience Lead at Positive Technologies

  16. Who’s Listening? A Call for Data Protection in Smart Devices

    There is a need for smart device manufacturers to go beyond regulation to get data collection and storage in data centers right

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  17. The Role Intelligent Hybrid TAPs Play in Connecting Security Solutions

    Why aren’t we combining TAP and Packet Broker functionality?

    1. Photo of Alastair Hartrup

      Alastair Hartrup

      CEO and founder of Network Critical

  18. Mastering Cloud Management - Get Connected

    Management in the cloud is arguably more important than on-premise

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  19. Authentication in the Age of GDPR

    Are organizations adjusting to the new regulatory reality?

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  20. A Short History of EDR

    The problems of EDR rose as you needed a skilled crew to manage these solutions

    1. Photo of Migo Kedem

      Migo Kedem

      Senior Director Products & Marketing, SentinelOne

What’s Hot on Infosecurity Magazine?