Infosecurity Opinions

  1. Leveraging the Biometrics Ecosystem to Improve Cybersecurity

    To properly leverage biometrics, you should understand elements that make it a powerful tool

    1. Photo of Bojan Simic

      Bojan Simic

      Cofounder and CTO, HYPR

  2. Failing to Accept Human Nature Makes for Shoddy Cybersecurity

    In the worst instances, unwittingly falling victim to a piece of malware could cost you your job

    1. Photo of Henry  Harrison

      Henry Harrison

      CTO and co-founder of Garrison

  3. The Value of Predictive Email Security

    Threat prediction can help businesses use data to prepare for what the next attack will look like

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  4. Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do

    Achieving risk management goals will not improve your risk posture

    1. Photo of Shay Colson

      Shay Colson

      Director at Duff & Phelps, CyberClarity360

  5. Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet

    By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm

    1. Photo of Max Heinemeyer

      Max Heinemeyer

      Director of Threat Hunting, Darktrace

  6. Before Blaming Hackers, Check Your Configurations

    Default SaaS settings often weigh easy access and usability over better security.

    1. Photo of Michael Hiskey

      Michael Hiskey

      Chief Marketing Officer, Avanan

  7. Tactics to Go Fully Secure in the Cloud

    The best ways to beef up cloud security posture and set yourself up for success

    1. Tim Reilly

      COO, Zettaset

  8. Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations

    Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  9. Actions After you Find the Network Anomaly

    Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  10. Months After the US Government Shutdown, Cybersecurity is Still Suffering

    Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

    1. Photo of Eric Poynton

      Eric Poynton

      Lead Network Threat Hunter at Awake Security

  11. An Incident Response Walkthrough - Why is Process so Important?

    How unusual activity on a laptop turned into a lesson on incident response

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

    2. Photo of Lauren Rudman

      Lauren Rudman

      Junior security researcher, SecureData Labs

  12. Reduce Security Complexity for Cloud Architectures

    Threats that target public clouds require a different type of insight and action

    1. Photo of Dan Hubbard

      Dan Hubbard

      Chief Product Officer at Lacework

  13. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

  14. Illuminating the Dark Web

    Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

    1. Photo of Gene Yoo

      Gene Yoo

      CEO, Resecurity

  15. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  16. Open Source Tools Provide Low-cost Development Options for Cyber-criminals

    Tools openly available to researchers are also available to those with more malicious intent

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  17. Cyber Attackers and IT Admins: Twins Separated at Birth

    The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

    1. Photo of Tal Zamir

      Tal Zamir

      Founder, CTO & Board Member, Hysolate

  18. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

  19. The Threat Hunting Architecture

    Threat hunting is the proactive process of looking for signs of malicious activity

    1. Photo of Rohit Sadgune

      Rohit Sadgune

      Senior Security Solution Engineer at Securonix

  20. Supply Chain Attacks: When Things Go Wrong

    How supply chain attacks have leveraged the weakest links in security

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

What’s Hot on Infosecurity Magazine?