Infosecurity Opinions

  1. Securing a Country’s Crucial Networks

    Safeguarding the public sector from cyber-attacks is a key responsibility of our country’s government

    1. Photo of Andrew Bushby

      Andrew Bushby

      UK director, Fidelis Cybersecurity

  2. Effective Risk Analysis in Cybersecurity, Operational Technology and the Supply Chain

    Whether in cybersecurity, operational technology, or supply chain domains, problems emerge when you assess and manage risk with quantitative analysis.

    1. Photo of Jim Hietala

      Jim Hietala

      VP Security, The Open Group

  3. Leveraging the Biometrics Ecosystem to Improve Cybersecurity

    To properly leverage biometrics, you should understand elements that make it a powerful tool

    1. Photo of Bojan Simic

      Bojan Simic

      Cofounder and CTO, HYPR

  4. Failing to Accept Human Nature Makes for Shoddy Cybersecurity

    In the worst instances, unwittingly falling victim to a piece of malware could cost you your job

    1. Photo of Henry  Harrison

      Henry Harrison

      CTO and co-founder of Garrison

  5. The Value of Predictive Email Security

    Threat prediction can help businesses use data to prepare for what the next attack will look like

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  6. Dashboards Don't Manage Risk – Difficult, Data-Driven Conversations Do

    Achieving risk management goals will not improve your risk posture

    1. Photo of Shay Colson

      Shay Colson

      Director at Duff & Phelps, CyberClarity360

  7. Glimpsing Inside the Trojan Horse: An Insider Analysis of Emotet

    By the end of 2018, Emotet had spread far and wide, shifted focus to U.S. targets, resulting in permanently lost files, costly business interruptions, and serious reputational harm

    1. Photo of Max Heinemeyer

      Max Heinemeyer

      Director of Threat Hunting, Darktrace

  8. Before Blaming Hackers, Check Your Configurations

    Default SaaS settings often weigh easy access and usability over better security.

    1. Photo of Michael Hiskey

      Michael Hiskey

      Chief Marketing Officer, Avanan

  9. Tactics to Go Fully Secure in the Cloud

    The best ways to beef up cloud security posture and set yourself up for success

    1. Tim Reilly

      COO, Zettaset

  10. Keeping a Clean Bill of Cyber Health – A Guide for Smaller Organizations

    Cybersecurity is an ongoing battle – not a tick-box exercise - so make it a continuous process

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  11. Actions After you Find the Network Anomaly

    Work isn’t done just because you found the needle in the haystack; in some ways, the real work is just beginning

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  12. Months After the US Government Shutdown, Cybersecurity is Still Suffering

    Four months on from the US Government shutdown, employees are scrambling to catch up with security admin

    1. Photo of Eric Poynton

      Eric Poynton

      Lead Network Threat Hunter at Awake Security

  13. An Incident Response Walkthrough - Why is Process so Important?

    How unusual activity on a laptop turned into a lesson on incident response

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

    2. Photo of Lauren Rudman

      Lauren Rudman

      Junior security researcher, SecureData Labs

  14. Reduce Security Complexity for Cloud Architectures

    Threats that target public clouds require a different type of insight and action

    1. Photo of Dan Hubbard

      Dan Hubbard

      Chief Product Officer at Lacework

  15. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

  16. Illuminating the Dark Web

    Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

    1. Photo of Gene Yoo

      Gene Yoo

      CEO, Resecurity

  17. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  18. Open Source Tools Provide Low-cost Development Options for Cyber-criminals

    Tools openly available to researchers are also available to those with more malicious intent

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  19. Cyber Attackers and IT Admins: Twins Separated at Birth

    The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

    1. Photo of Tal Zamir

      Tal Zamir

      Founder, CTO & Board Member, Hysolate

  20. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

What’s Hot on Infosecurity Magazine?