Infosecurity Opinions

  1. Accessibility Trumps Security in the Battle Between Authentication Alternatives

    We have the technology to make authentication more secure, so why do we insist on outdated, tired and inferior solutions?

    1. Photo of Rob Otto

      Rob Otto

      EMEA Field CTO, Ping Identity

  2. Why Open Port Monitoring is Both an Essential and Flawed Security Control

    Checking for open ports sounds simple, but the reality is way off.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

  3. Is Security The Loser As Open Banking Takes Hold?

    What security challenges does PSD2 and open banking present?

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  4. Safely Stretching Resources to Meet Industrial Cybersecurity Needs

    ICS leaders turn to specialized skillsets and advancements in secure remote access to further their industrial cybersecurity.

    1. Photo of Mark Littlejohn

      Mark Littlejohn

      Global Leader, Managed Industrial Cyber Security, Honeywell Process Solutions

  5. Suspending Privacy Shield? A Look at What's At Stake

    Market demand for Privacy Shield is soaring while being under review by the European Commission.

    1. Photo of Hilary Wandall

      Hilary Wandall

      Chief Data Governance Officer, TrustArc

  6. Would Cybersecurity Professionals Make the Best DPOs

    Could a cybersecurity professional have the skills to become a data protection officer?

    1. Photo of Jan van Vliet

      Jan van Vliet

      VP and GM EMEA

  7. Fingerprint Sensors are Not the Guarantee to Privacy

    How fingerprints are being used for authentication, but may not be flawless.

    1. Photo of Zehra Ali

      Zehra Ali

      Cybersecurity Writer

  8. How Threat Actors Abuse Legitimate Sites to Bypass Security Defenses

    Website abuse techniques offer several benefits to attackers

    1. Photo of Max  Gannon

      Max Gannon

      Intelligence Analyst, Cofense

  9. Debunking Common Misconceptions about Third-Party Risk Management

    Debunking several misconceptions about managing a third-party risk program have emerged in recent years.

    1. Photo of Stephen Boyer

      Stephen Boyer

      CTO, BitSight

  10. Managed Threat Hunting Fills a Critical Gap

    Can managed threat hunting get you in the proactive detection game?

    1. Photo of Scott Traschler

      Scott Traschler

      Director of Product Marketing, CrowdStrike

  11. Co-operate with the State: Altering Approaches to Intelligence-Sharing in Security

    A more organized, combined approach is needed to bring about collective digital security – one that pools together the resources and knowledge we have at our fingertips to assess the current threat environment.

    1. Photo of Adam Vincent

      Adam Vincent

      CEO of ThreatConnect

  12. Get Rid of your Database Security “Hairball” with Database Security 2.0

    How SaaS, AI/machine learning, and unified database visibility play a critical role for achieving comprehensive security in today’s on-prem and multi-cloud database environments.

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  13. Protecting Private Data in Virtual Environments with New Encryption Approaches

    New approaches for encryption protection in virtual environments.

    1. Anand Kashyap

      Co-Founder and CTO, Fortanix

  14. Securing Against Developer Pressure

    It is no longer acceptable to consider any connected software a finished product.

    1. Photo of Jamie Bennett

      Jamie Bennett

      VP of Engineering, IoT & Devices at Canonical

  15. Strengthen Data Breach Defenses with Emulation Assessments

    With data breach emulation, assessments are based on the use of actual attack components.

    1. David De Santo

      Director of products and threat research, Spirent

  16. The Power of Quantum: Reshaping the Cybersecurity Landscape

    Quantum computing promises medical breakthroughs, important scientific discoveries and key developments in manufacturing.

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  17. Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning

    Penetration tests can fail before they even start, thanks to poor scoping.

    1. Photo of Tod  Beardsley

      Tod Beardsley

      Director of Research, Rapid7

  18. Resolving the Tension between Hybrid/Multi-Cloud Settings and Greater Attack Surfaces

    Beyond deperimeterization, on-premise, hybrid and multi-cloud use cases merely expands organizational attack surface

    1. Photo of Jelani Harper

      Jelani Harper

      Editorial Consultant

  19. The Impact of AI on the Cybercrime Economy

    The cyber-criminal community will adjust and accelerate their development effort using AI and machine learning technologies.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  20. How to Integrate Business Security Systems

    Is it better to buy a multi-functional suite with all the features or separate technology for the different areas you need to protect?

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

What’s Hot on Infosecurity Magazine?