Infosecurity Opinions

  1. Radical Transparency and Zero Trust: Putting Concept into Practice

    Visibility and trust are key to radical transparency

    1. Photo of Jordan Mauriello

      Jordan Mauriello

      Senior vice president of managed security at Critical Start

  2. Should You Build Your Infrastructure to be Hit by a Cyber Attack?

    How do you prepare for an attack you cannot stop? Try passive survivability

    1. Photo of Robert Rhame

      Robert Rhame

      Director of EMEA Product Marketing, Rubrik

  3. #HowTo Avoid Common Configuration Sins

    Top five preventable configuration mistakes that can lead to a security breach.

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  4. SAST: Beginning at the End

    The beauty and ugly side of static analysis

    1. Photo of Arthur Hicken

      Arthur Hicken

      Evangelist, Parasoft

  5. Exploring the Dark Net - Behind Enemy Lines

    A strong understanding of operational security and acceptance of the risks associated with this type of research is key

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  6. Will “Sign in With Apple” Revolutionize Digital Identity?

    The Apple credit card may be the first step in entering the identity space

    1. Photo of Thomas Bostrøm Jørgensen

      Thomas Bostrøm Jørgensen

      General Manager, EMEA, AllClear ID

  7. Digital Transformation and IT – Customer Clarity, but IT Blindness

    As digital transformation makes businesses more responsive to customer demands, so security has to follow

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  8. What’s Driving the Need for Automated Security?

    How do developers keep up with the pace of agile?

    1. Photo of Doug Dooley

      Doug Dooley

      COO, Data Theorem

  9. Diving into IoT: What Works for Your Business?

    When it comes to IoT, there is no one-size-fits-all approach

    1. Photo of Volodymyr Fedak

      Volodymyr Fedak

      Solution Architect, SoftServe

  10. In the Gig Economy, Background Checks are a Thing of the Past

    Companies aren’t doing their due diligence when hiring gig workers or vetting platform users

    1. Photo of David Thomas

      David Thomas

      CEO, Evident ID

  11. Don’t be at Sea When it Comes to Protecting Against Mobile Phishing

    Attackers are now targeting security padlocks and address bars on popular sites

    1. Photo of Tom Davison

      Tom Davison

      EMEA Technical Director, Lookout Inc

  12. From Shift Left to Shift Up: Securing Containers and Serverless Architectures

    Security must also “Shift Up” to focus on protecting the application tier after deployment

    1. Photo of Tsvi Korren

      Tsvi Korren

      VP of Product Strategy, Aqua Security

  13. Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

    63% of SMBs believing that cloud storage providers should do more to protect their data

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  14. Don’t Play the Victim: #HowTo Create a Ransomware Backup Plan

    Well managed data is easier to locate, utilize and update with the latest security policies

    1. Photo of Jasmit Sagoo

      Jasmit Sagoo

      Senior Director, Head of Technology UK&I, Veritas Technologies

  15. Privacy and Data Protection in Multimedia Apps

    The processing of sensitive data through multimedia apps poses significant risks to data security and privacy

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

  16. Cybersecurity – It Takes an Engineer to Catch an Engineer

    How to use cyber-criminal behavior pattern knowledge to our advantage

    1. Photo of Elias Haddad

      Elias Haddad

      ICT Business Analyst

  17. The Most Influential Security Frameworks of All Time

    Security frameworks make it possible for organizations to speed up the adoption of strong cybersecurity measures

    1. Photo of Howard Dawson

      Howard Dawson

      Tech Writer, SurfShark

  18. Safety and Security in Industry 4.0 – Are You Ready?

    A fundamental challenge remains about how advances should be secured

    1. Photo of Nigel Stanley

      Nigel Stanley

      CTO for OT and Industrial Cybersecurity, TUV Rheinland

  19. The Rise of Employee Monitoring: Ensuring Security without Sacrificing Trust

    The burden has shifted to employers to detect and respond to abnormal or anomalous employee-related behavior

    1. Photo of Sean T. Horner

      Sean T. Horner

      Director at The Chertoff Group

  20. Constant Visibility is Crucial to Enterprise Mobile Security

    Enterprise IT or security teams have almost zero visibility when it comes to mobile devices

    1. Joel Windels

      CMO, NetMotion Software

What’s Hot on Infosecurity Magazine?