Infosecurity Opinions

  1. WannaCry Exposed Organizations' Weakest Link: How we Make it Stronger

    While the true scale of the WannaCry epidemic has yet to be revealed, the cybersecurity industry should already be learning from the incident, to make sure it’s never repeated.

    1. Photo of Colin McTrusty

      Colin McTrusty

      Director of EMEA at Wombat Security

  2. How to Integrate Mobile Security into App Development

    While it’s recommended to benchmark your application for internal improvements, it is also very essential to perform security benchmarking against other programs

    1. Photo of Harnil Oza

      Harnil Oza

      CEO of Hyperlink Infosystem

  3. WannaCry: A Refreshing Attack

    $300 is just enough to get attention and make a point without inflicting financial damage.

    1. Photo of Evan Bundschuh

      Evan Bundschuh

      Vice president at GB&A

  4. One Week of WannaCry

    What you need to know about the WannaCry ransomware attack.

    1. Paul Burbage

      Malware Researcher for Flashpoint

    2. Photo of Ronnie Tokazowski

      Ronnie Tokazowski

      Principal Threat Advisor, Cofense

  5. AI: The Good, The Bad and The Ugly

    AI’s massive processing power is far faster than the human brain in computational ability, and is progressing in conventionally “human” areas.

    1. Avi Chesla

      CEO and founder of empow

  6. Dummies' Guide to WannaCry

    The WannaCry cyber-attack has gripped news headlines around the world.

    1. Martin Cooper

      Content Manager - BCS The Chartered Institute for IT

  7. Secure Remote Network Access Without Giving Away the Keys to the Castle

    How per-application access can help organizations to tighten security control over third-parties, without having to worry about how many different devices are trying to connect, and from where.

    1. Photo of Mike Hanley

      Mike Hanley

      Mike Hanley, Senior Director of Security, Duo Security

  8. Using Employees as Breach Detectors

    Training employees to reduce mistakes is a staple of every security program.

    1. Photo of Jeremy Bergsman

      Jeremy Bergsman

      Managing Director, IT Practice, CEB

  9. Lost in Translation? Managing Mixed Firewall Estates

    How organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks.

    1. Photo of Avishai Wool

      Avishai Wool

      CTO, AlgoSec

  10. The Future of Ransomware: Data Corruption, Exfiltration and Disruption

    What’s Next for Ransomware? The ransomware trends expect to see are Data Corruption, Exfiltration and Disruption.

    1. Photo of Elad Erez

      Elad Erez

      Director of Innovation at Imperva

  11. The True Costs of Selling Out Our Privacy

    Weakened encryption standards will hurt the US where it can least afford it – in its wallet.

    1. Photo of Andrew Newman

      Andrew Newman

      CEO and founder of Reason Software Company

  12. Securing DNS Against the Threat of Things

    While likely to revolutionize how we live, work, and play, the IoT also presents a security challenge to the networks that support it.

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  13. SoC: Understanding the Threat & How IT Leaders Can Maintain Security

    Connected devices across many verticals will pack increasing numbers of modular single-purpose systems on chips (SoCs) into a single product

    1. Photo of Zachary Crockett

      Zachary Crockett

      CTO, Particle

  14. Will New Cybersecurity Legislation Offer Better Protection for Consumers?

    All sectors of commerce and government – big and small – need rigorous cybersecurity measures, regardless of legislative mandates

    1. Photo of James E. Lee

      James E. Lee

      Executive Vice-President, Waratek

  15. Securing Devices Without Invading Privacy

    Some mobile security policies and solutions are at odds with the culture of productivity, freedom, and flexibility that organizations are working to enable.

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  16. Shifting Left on Security and Software Delivery

    Under the term ‘shift left testing’, IT teams have learned to collaborate in order to deliver software faster, with fewer flaws.

    1. Photo of Chris Carlson

      Chris Carlson

      Vice President Product Management, Qualys

  17. Seven Security Lessons from Rogue One: A Star Wars Story

    Seven steps show how the security blunders that the Empire made in Rogue One: A Star Wars Story facilitated the biggest data breach in the galaxy, and what they can teach us about security and compliance.

    1. Photo of Al Sargent

      Al Sargent

      Senior Director of Product at OneLogin

  18. Non-Security Tips for Security Professionals

    Security professionals should adapt their skill sets to communicate effectively with a newer and more senior set of stakeholders.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  19. Deception as Defense - Turning the Tables on the Hackers

    New approaches are emerging in which organizations can turn the tables on the attackers

    1. Photo of Kevin Eley

      Kevin Eley

      VP EMEA, TrapX

  20. Cyber Insurance Achilles Heel Contains Opportunity

    Reports of many companies adopting cyber insurance at a rapid rate is a bit at odds with the experience of many in the insurance community.

    1. Photo of Evan Bundschuh

      Evan Bundschuh

      Vice president at GB&A

What’s Hot on Infosecurity Magazine?