Infosecurity Opinions

  1. Can You Trust Your AI?

    Evaluating Machine Learning algorithms in practice

    1. Photo of Peter Gyongyosi

      Peter Gyongyosi

      Director of Privileged Access Management Solutions at One Identity

  2. Illuminating the Dark Web

    Dark web monitoring is a vital piece of the puzzle in the enterprise risk management process

    1. Photo of Gene Yoo

      Gene Yoo

      CEO, Resecurity

  3. Whose Team Is Artificial Intelligence On: The Corporations or Hackers?

    As we create more innovative solutions as a society, do we also set ourselves up for harder, more damaging falls?

    1. Photo of Nathan Sykes

      Nathan Sykes

      Technology Writer

  4. Open Source Tools Provide Low-cost Development Options for Cyber-criminals

    Tools openly available to researchers are also available to those with more malicious intent

    1. Photo of Anthony Giandomenico

      Anthony Giandomenico

      Senior Security Strategist & Researcher, Fortinet

  5. Cyber Attackers and IT Admins: Twins Separated at Birth

    The sooner we realize how similar IT admins and cyber-criminals are in how they think and the tools they use, the better equipped we’ll be to improve security posture.

    1. Photo of Tal Zamir

      Tal Zamir

      Founder, CTO & Board Member, Hysolate

  6. Could New eCommerce Fraud Rules Separate the Best from the Rest in 2019?

    Mandated adoption of Strong Consumer Authentication is coming this year as part of PSD2, requiring additional layers of authentication for specific types of transactions

    1. Photo of Sean Neary

      Sean Neary

      Senior Product Officer, Featurespace

  7. The Threat Hunting Architecture

    Threat hunting is the proactive process of looking for signs of malicious activity

    1. Photo of Rohit Sadgune

      Rohit Sadgune

      Senior Security Solution Engineer at Securonix

  8. Supply Chain Attacks: When Things Go Wrong

    How supply chain attacks have leveraged the weakest links in security

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  9. Fast and Furious Phishing Attacks – The Race Against Time Matters

    The race against time matters when defending against phishing attacks

    1. Photo of Atif Mushtaq

      Atif Mushtaq

      CEO of SlashNext

  10. Double Edged Sword of Secure Traffic

    The positive and negative aspects of encrypted traffic

    1. Photo of James  Preston

      James Preston

      Security Architect, ANSecurity

  11. Homomorphic Encryption for Secure Elastic Data Stream Processing

    How Fully Homomorphic Encryption can aid your cloud security

    1. Photo of Miyuru Dayarathna

      Miyuru Dayarathna

      Senior Technical Lead, WS02

  12. Debunking the Discourse Around Cloud Security

    A widespread embrace of the cloud has brought benefits for collaboration and communication.

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  13. Why Third-Party Risk Assessment must be an Ongoing Process

    As companies rely on many partners and suppliers, prioritization is an essential first step to managing third-party risk

    1. Photo of Malcolm Taylor

      Malcolm Taylor

      Director Cyber Advisory, ITC Secure

  14. The Changing Structure of Cybersecurity Teams

    For CISOs charged with protecting businesses from attacks, it's a constantly shifting battleground

    1. Photo of Paul DeCoster

      Paul DeCoster

      Principal, Head of Practice – Risk, Legal, Compliance & Security (North America), Marlin Hawk

  15. Robots vs False Positives: AI is Future Protection for Applications and APIs

    Are the tools and processes we rely on leaving us vulnerable?

    1. Photo of Ivan Novikov

      Ivan Novikov

      CEO, Wallarm

  16. The Deal with Quantum Computing and Cryptography

    Quantum computing continues to heat up as one of the major battlefields for security

    1. Photo of Andreas Baumhof

      Andreas Baumhof

      Vice President Quantum Technologies, QuintessenceLabs

  17. Efficient Steps Toward a Successful PAM Implementation

    How to ensure a successful privileged access management implementation

    1. Photo of Cathy Hall

      Cathy Hall

      PAM Practice Lead, Sila

  18. How Forgotten Legacy Systems Could Be Your Downfall

    With end of support for Windows 7 announced for January, will we see more vulnerable networks?

  19. Is your DDos Mitigation Strategy Terabit-Proof?

    Larger and stronger DDoS attacks require a new approach to mitigate them

    1. Photo of Jeff Smith

      Jeff Smith

      Director of Security Strategy, IP & Optical Networks Group, Nokia

  20. Explaining the Breakout Success of the NIST Cybersecurity Framework

    The motivations and development that made the NIST Cybersecurity Framework a reality

    1. Joseph Perry

      Director of Research at Cybrary

What’s Hot on Infosecurity Magazine?