Infosecurity Opinions

  1. Is Your InfoSec Tech Stack Causing Dangerous Blind Spots?

    Most companies are looking at cybersecurity solutions as a series of “bolt-ons” to the existing tech stack, instead of mapping out a comprehensive plan to help monitor the threat landscape and execute defense against an attack.

    1. Photo of Tim Roncevich

      Tim Roncevich

      partner at CyberGuard Compliance.

  2. Essential Elements Needed for a Successful Threat Hunt

    Threat hunting is vital to reduce the spread and effectiveness of attacks, but a large proportion of organizations are yet to engage in this type of activity.

    1. Photo of Mark Nicholls

      Mark Nicholls

      Director of Cybersecurity, Redscan

  3. From the Developer’s Perspective - Navigating the IoT Security Storm

    In the IoT gold rush, and the race to realize the market’s potential, many companies have been deprioritizing security.

    1. Photo of Evan Dandrea

      Evan Dandrea

      Engineering Manager at Canonical

  4. McDreary? The Future of Medical Call Centers & DDoS

    A DDoS attack on a healthcare system can cause click-to-call features to be taken offline, and the implications can mean life or death.

    1. Photo of Mark Pietras

      Mark Pietras

      CTO and co-founder, Revation Systems

  5. Teaching Old Dogs New Tricks

    Security teams need to gain an understanding of each application within their network and find out how it interacts with external entities.

    1. Photo of Christopher Steffen

      Christopher Steffen

      Technical Director at Cyxtera

  6. Cloudy With a Chance of Cryptojacking

    Cloudjacking is a growing trend: stealing processing and storage from someone else’s cloud account.

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  7. The Importance of Device Security in IoT Ecosystems

    It is crucial that the resiliency of IoT devices are understood to prevent systemic security issues in the future.

    1. Photo of Dave Belt

      Dave Belt

      Technology Evangelist, Irdeto

  8. Quantum: The future For Data Center Technology

    How will advances in quantum computing affect the data center industry, and will these effects be positive?

    1. Photo of Jeremy Schaller

      Jeremy Schaller

      Industry Analyst at Exit Technologies

  9. What Europe Can do to Catch Dark Web Criminals

    Could the Europol dark web investigation team succeed in pinning down underground attackers?

    1. Photo of Liran Sorani

      Liran Sorani

      Cyber Business Unit Manager, Webhose

  10. How Immutable Infrastructure Changes the Modern Security Mindset

    How the rise of cloud-native applications are changing the security game.

    1. Photo of John  Morello

      John Morello

      Chief Technology Officer at Twistlock

  11. Why Businesses Can't Ignore Crypto Agility

    Crypto agility encompasses the range of policies, technology and initiatives organizations must dedicate themselves to in becoming resilient against quantum computing

    1. Photo of Malte Pollmann

      Malte Pollmann

      CEO, Utimaco

  12. Don't Undermine Data Security Investments by Dismissing Data Governance

    Data security investments may be useless if poor data governance processes are in place.

    1. Photo of Jim Varner

      Jim Varner

      CEO, SecurityFirst

  13. Selling Servers by Proxy?

    The second-hand server market is thriving but how do you get the most bang for your buck?

    1. Photo of Jeff Bittner

      Jeff Bittner

      Founder and President of Exit Technologies

  14. GDPR and California's New Privacy Could Mean Millions in Costs to Organizations

    Data access requests could result in millions of dollars in operational costs for organizations that already face unprecedented fines in case of a security breach.

  15. A Multi-Pronged Approach to Fighting Fraud with Fingerprinting and Cross-Device

    Cross-device tracking is aimed at crossing the boundaries between a fraudster's individual devices and browsers.

    1. Photo of Stefan Klisarov

      Stefan Klisarov

      Data Scientist, Screen6

  16. Brand Reputation Through Automation

    Firms that embrace cutting-edge application security solutions and automate procedures can stay one step ahead of the hacker

    1. Photo of David Maclean

      David Maclean

      Systems Engineer, F5

  17. Fighting Fire with Fire: Why Proactive Security is so Vital for Businesses

    More proactive form of defense is necessary and leverages Big Data analytics, network function virtualization, cloud scalability and penetration tactics to handle how cyber-criminals operate.

    1. Photo of Ben Ferguson

      Ben Ferguson

      Senior Network Architect and Vice President of Shamrock Consulting Group

  18. Say Goodbye to Passwords, the Future of Authentication is Here

    The answer to passwords is zero login, using intricate and unique patterns.

    1. Photo of Sarah Squire

      Sarah Squire

      Senior Technical Architect, Ping Identity

  19. Solving PII and Data Security Challenges in a new Compliant World

    How could the Consumer Privacy Act impact your corporate strategy?

  20. Real Security is a Question of Business Value

    CISOs would be wise to ask about overall business value, not just technical value or a solution’s ROI.

    1. Photo of John 'Lex' Robinson

      John 'Lex' Robinson

      Cybersecurity Strategist, Cofense

What’s Hot on Infosecurity Magazine?