Infosecurity Opinions

  1. Why Modern Security Teams can no Longer Overlook Benefits of Orchestration

    Once IT teams have orchestration technologies supporting security processes, they can make an active impact to the efficiency of employees

    1. Photo of Luis Delabarre

      Luis Delabarre

      Cybersecurity CTO at Capgemini

  2. Addressing Inherent Risks in Code Repositories

    Open source platforms enable cross-collaboration across development teams, however they also inadvertently introduce new security risks.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  3. Getting Control of Security Controls

    A focus on technology first, or an imbalanced control implementation, doesn’t necessarily lead to greater protection

    1. Photo of Douglas Ferguson

      Douglas Ferguson

      Founder and CTO, Pharos Security

  4. A Level Playing Field for Threat Intelligence

    The five priorities that every threat intelligence strategy should consider.

    1. Photo of Marc French

      Marc French

      Senior Vice President & Chief Trust Officer, Mimecast

  5. Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk

    Regardless of what version of software you are on, there may be a zero-day that exists

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  6. Does Compliance Equal Security in the Age of Data Privacy?

    Does compliance lead to security? That's the €20 million question.

    1. Photo of Felix Rosbach

      Felix Rosbach

      Product manager at comforte AG

  7. The Journey to Data Integrity

    How we can verify the authenticity of the things we see and hear, and what does this mean for data security?

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  8. Adding Tools to Tools

    How to combat insiders and external attacks with better authentication use.

    1. Photo of Julien Orsolini

      Julien Orsolini

      System Engineer EMEA, Opengear

    2. Photo of Romain Pia

      Romain Pia

      Southern Europe Manager, Opengear

  9. Questioning the Machine

    Although IT security has often favored “black box” solutions, it is worth gaining guidance on the technical components of ML/AI.

    1. Photo of John Omernik

      John Omernik

      Distinguished technologist at MapR

  10. Don’t Leave Your Doors Open - Secure Your APIs Now

    Organizations fail to effectively safeguard APIs and often see an influx of security threats as a result.

    1. Photo of Keith Casey

      Keith Casey

      API Problem Solver, Okta

  11. The Benefits of Correctly Deploying a PKI Solution

    Why and how PKI has remained a crucial part of an information security strategy.

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  12. Why You Should Implement Privacy by Design Before GDPR’s First Birthday

    How do you achieve privacy by design when the GDPR is unspecific on how to do it?

    1. Photo of Tomas Sander

      Tomas Sander

      Director of Data Privacy, Intertrust Corporation

  13. Making the Case for Cybersecurity Investment

    Business leaders are yet to fully embrace the value of cybersecurity.

    1. Photo of Spencer Young

      Spencer Young

      Regional Vice President EMEA, Imperva

  14. Unraveling the Quandary of Access Layer versus Storage Layer Security

    How to ensure security and data access which is flexible enough for regulatory compliance.

    1. Photo of Jelani Harper

      Jelani Harper

      Editorial Consultant

  15. Hacking Video Conferencing Platforms - The Next Big Thing?

    Has society realized the vulnerability dangers within video calling and conferencing technologies.

    1. Photo of Ronen Slavin

      Ronen Slavin

      Head of Research at Reason Cybersecurity

  16. Converged OT/IT Networks Introduce New Security Risks

    At the core of the “Industry 4.0” trend, is the convergence of operations technology (OT) and information technology (IT) networks.

    1. Photo of Reggie  Best

      Reggie Best

      President, Lumeta (a FireMon company)

  17. Dark Net Recruitment is Turning Employees into Malicious Insiders For-Hire

    A growing number of dark web recruitment pages could see your staff snared into an ongoing role.

    1. Photo of Simon Sharp

      Simon Sharp

      International vice president

  18. Implementing ISO 27001 and Avoiding Potential GDPR Consequences

    Steps businesses can take to implement ISO 27001 and avoid potential consequences from the GDPR.

    1. Photo of Matt Stacey

      Matt Stacey

      Managing Director, QMS International

  19. Moody’s Cyber Ratings Could Not Come at a Better Time – if They’re Done Right

    Moody's will add cyber risk into credit ratings, how can that be done?

    1. Photo of Ed Bellis

      Ed Bellis

      Co-founder and CTO, Kenna Security

  20. New Year. New Job. Same Threat.

    The new year means an influx of job applications. How securely are you storing these details?

    1. Photo of Simon Wiseman

      Simon Wiseman

      CTO, Deep Secure

What’s Hot on Infosecurity Magazine?