Infosecurity Opinions

  1. The Security Nightmare of Formjacking

    Staying ahead of trends and the security game, hackers have latched onto another high-return attack

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. #HowTo Vet AI Threat Detection Solutions for Stronger Cybersecurity

    A behavioral analytics-based approach looks at motives rather than tactics

    1. Photo of Yossi Naar

      Yossi Naar

      Chief Visionary Officer & Co-Founder, Cybereason

  3. The Role of Data in Managing Application Risk

    Risk assessment and vulnerability reporting presents the first significant data management challenge faced by appsec programs

    1. Photo of Syed Abdur Rahman

      Syed Abdur Rahman

      VP, Product Management & Marketing, Brinqa

  4. The Five Pillars of Actionable Cloud Security

    Designing and deploying an actionable cloud security framework that follows industry best practices (in sequence) gives companies the best chance for success.

    1. Photo of Tim Jefferson

      Tim Jefferson

      VP of public cloud at Barracuda Networks

  5. #HowTo Enable Effective Security Awareness Training

    Steps to take to enable efficient security awareness

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  6. Protecting Service Revenue from Hackers: Cybersecurity for Connected Maintenance Apps

    Modern maintenance apps provide on-site history, diagnostics, performance measurement and tunability of systems

    1. Photo of Mark Hearn

      Mark Hearn

      Director of IoT Security and Business Development, Irdeto

  7. Apps: Gateway to Your Private Data

    For companies that store personal data, there is a hefty burden of responsibility.

    1. Photo of Terry Ray

      Terry Ray

      SVP, Imperva

  8. What Should Frighten us about AI-Based Malware?

    AI machine learning (ML) security powered by algorithms was intended to defeat cyber doom and gloom

    1. Photo of Steve Rymell

      Steve Rymell

      Head of Technology, Airbus CyberSecurity

  9. The Brexit Threat: Chaos, Confusion and Con Men

    Confusion brought about by Brexit is opening up more opportunities for cyber-criminals

    1. Photo of Guy Bunker

      Guy Bunker

      SVP of Products, Clearswift

  10. Vendors Need to Stop Fear Selling, it’s Damaging the Whole Industry

    FUD selling is frustrating, unhelpful and damaging

    1. Photo of Aidan Simister

      Aidan Simister

      CEO, Lepide

  11. Cybersecurity: Lessons from Israel

    Israel’s current set up continues to create a constant stream of talented cybersecurity operatives

    1. Photo of Andrzej Kawalec

      Andrzej Kawalec

      European Director of Strategy & Technology, Optiv

  12. Why a Flash-To-Cloud Approach Will Be the Last Protection Standing in the IoT

    An innovative approach to IoT security is to protect the device’s flash, even from the processor and the software that is running on it

    1. Photo of Yoni Kahana

      Yoni Kahana

      VP, Customers, NanoLock Security

  13. Password Spraying Fells Citrix. Are We Next?

    The Citrix breach could turn out to be one of the most important in recent years

    1. Photo of Amit Rahav

      Amit Rahav

      VP of Marketing and Customer Success for Secret Double Octopus

  14. Avoiding Security Certificate Missteps

    Digital certificates and signatures offer a foundational layer of trust to reinforce corporate IT security strategy

    1. Photo of Chris Hickman

      Chris Hickman

      Chief Security Officer, Keyfactor

  15. Stop the Noise, Time to Rationalize Cybersecurity

    Security managers moving away from buying solutions and focus on consolidation and simplification of security stacks

    1. Photo of David Atkinson

      David Atkinson

      Founder and CEO of Senseon

  16. The Rise of Stegware

    The rise of “Stegware": more evidence threats are getting stealthier and the need for visibility is rising

    1. Photo of Barbara Kay

      Barbara Kay

      Senior Director of Security, Extrahop

  17. API Security Vulnerabilities: A Crack in the Foundation of Digital Business

    A Digital Business Foundation Built on APIs

    1. Photo of Derick Townsend

      Derick Townsend

      VP, Product Marketing, Ping Identity

  18. Preparing for the California Consumer Privacy Act: Avoid the Landmines & Learn from GDPR

    Looking forward to the CCPA, and what impact GDPR has had upon it

    1. Photo of Robert Prigge

      Robert Prigge

      President, Jumio

  19. Securing a Country’s Crucial Networks

    Safeguarding the public sector from cyber-attacks is a key responsibility of our country’s government

    1. Photo of Andrew Bushby

      Andrew Bushby

      UK director, Fidelis Cybersecurity

  20. Effective Risk Analysis in Cybersecurity, Operational Technology and the Supply Chain

    Whether in cybersecurity, operational technology, or supply chain domains, problems emerge when you assess and manage risk with quantitative analysis.

    1. Photo of Jim Hietala

      Jim Hietala

      VP Security, The Open Group

What’s Hot on Infosecurity Magazine?