Infosecurity Opinions

  1. Are Collaboration Tools Outpacing Security?

    Collaboration tools are easy to use, but can be diametrically opposed to security by facilitating user behaviors that put organizations at risk

    1. Photo of Ramon Peypoch

      Ramon Peypoch

      SVP Products, Vera

  2. Overcoming Communication Barriers and Other Challenges

    Apart from the operational issues, it is human nature and long-held attitudes that keep the businesses from being innovative and cybersec-focused

    1. Photo of Evgenia Broshevan

      Evgenia Broshevan

      Product Manager at Hackenproof

  3. The e-state of Estonia – and its Lessons for Our Digital Future

    How Estonia's example can lead on implementable authentication

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  4. Navigating Business Email Compromise Responses, From Data Mining to Notification

    A new class of data breach vulnerability has been exposed due to hosted email

    1. Photo of Brookes Taney

      Brookes Taney

      Vice president of data breach solutions, Epiq

  5. Risk-Based Security Scores that Matter to your Business

    How can you correlate CVSS with the threats you face?

    1. Photo of John Stock

      John Stock

      Director of Product Management, Outpost24

  6. Identity-Defined Security is Critical in a Digital Transformation World

    Digital transformation requires a different approach to IAM, optimizing people, process and technology

    1. Photo of Julie Talbot-Hubbard

      Julie Talbot-Hubbard

      Global Vice President and General Manager, Digital Identity and Data Services, Optiv

  7. Don’t Overlook Geopolitics in Threat Intelligence

    Geopolitically significant events impacting nation states often precede malicious cyber activity

    1. Photo of Chris Camacho

      Chris Camacho

      Chief Strategy Officer at Flashpoint

  8. The Time to Implement a New Cybersecurity Playbook is Now

    How Q1's trends can shape 2019's playbook

    1. Photo of Rohit Dhamankar

      Rohit Dhamankar

      VP, Threat Intelligence Products at Alert Logic

  9. Boosting Corporate Security with the Intrusion Kill Chain

    How the intrusion kill chain can keep you ahead of adversaries.

    1. Photo of Tim Rains

      Tim Rains

      Cybersecurity & Compliance Leader for EMEA, AWS

  10. Security by Design – Trust in the Intelligent Cloud

    How to formulate a successful collaboration strategy and planning a robust cloud security posture

    1. Photo of William McDonald

      William McDonald

      Chief Technology Officer at StarLeaf

  11. Manufacturing Cybersecurity - the Brexit Lookout

    Will Brexit leave British industry at the mercy of cyber attackers?

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

  12. Excessive Access is a Threat to Mainframe Security – Is Your Company at Risk?

    Excessive access is usually uneccessary, how can you better manage it?

    1. Photo of Ray Overby

      Ray Overby

      Founder and President, Key Resources

  13. Keeping the .UK Internet Secure For All

    2019 will see third-level. UK domains face the decision of taking up the second-level equivalent

    1. Photo of Oli Hope

      Oli Hope

      Director of Registry Services, Nominet

  14. What is Wrong with IoT Security Today?

    Many organizations are using Public Key Infrastructure (PKI), but doing so without thinking beyond the next couple of years

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  15. HIPAA Compliance in the Cloud: Who’s Responsible?

    Cloud compliance is important, although it does not have to be complicated

    1. Photo of David Hold

      David Hold

      Senior Product Marketing Manager, j2 Cloud Services

  16. Forgotten, But Not Gone: The Security Risk of Legacy Apps

    Legacy apps are a part of any company’s growth story, whether an organization grows organically or through M&A

    1. Tim Buntel

      VP of Application Security, Threat Stack

  17. A US State of Readiness?

    Does the US need its own version of GDPR?

    1. Photo of Paul Sonntag

      Paul Sonntag

      Director of GDPR and privacy, Coalfire

  18. Can Your Data Be Held Hostage?

    How do you know if your data is held hostage, or altered without your knowledge?

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  19. The Insider Threat - the Top Security Issue of 2019?

    The insider threat should be addressed in a systematic manner, with policies applied both internally and to your assessments of outside services.

    1. Photo of Marty Puranik

      Marty Puranik

      Founder and CEO of Atlantic.Net

  20. How Modern Web Applications Changed the Way Enterprises Should Handle Security

    APIs have proliferated across application environments to allow access to a much broader range of users

    1. Photo of Roey Eliyahu

      Roey Eliyahu

      CEO and Co-Founder, Salt Security

What’s Hot on Infosecurity Magazine?