Infosecurity Opinions

  1. What Makes the FIFA World Cup a Prime Target for Cyber-Criminals?

    Sporting events like the FIFA world cups are a tempting target for DDoS attackers

    1. Photo of Richard Hummel

      Richard Hummel

      ASERT Threat Intelligence Lead at NETSCOUT

  2. Tackling the Scourge of Advertising Fraud

    Cybersecurity teams need to work in parallel with marketers to lessen the impact made by ad fraud

    1. Photo of Adam French

      Adam French

      regional vice president (EMEA), TrafficGuard

  3. #HowTo: Strengthen Supply Chain Security

    Eilon Elhadad identifies three key areas we should focus on to strengthen supply chain security

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  4. How to Mitigate the Cyber Risks of Energy Blackouts

    Potential energy blackouts this winter could cause cyber risks for organizations if they aren't prepared

    1. Photo of Scott Goodwin

      Scott Goodwin

      COO and co-founder, DigitalXRAID

  5. Beyond Google: The Real Problem with Data Privacy

    We need to accelerate the adoption of new technologies, protocols and standards that prioritize the control of data by eliminating silos and copies

    1. Photo of Chris McLellan

      Chris McLellan

      director of operations, Data Collaboration Alliance

  6. #HowTo: Make Security a Board Level Discussion

    Creating a collective approach to cybersecurity starts from the top down, says Microsoft's Sarah Armstrong-Smith

    1. Photo of Sarah Armstrong-Smith

      Sarah Armstrong-Smith

      Chief Security Advisor, Microsoft

  7. Turning Data into Evidence to Accelerate SecOps Success

    Contextual understanding of data is crucial to enhance network defenders' detection and response capabilities

    1. Photo of Jean Schaffer

      Jean Schaffer

      CTO, Corelight

  8. Moving Away From a ‘Checklist’ Approach to Federal Compliance in Cloud Security

    The way organizations implement federal cloud security frameworks determines the risk and therefore effectiveness of the controls

    1. Photo of Krishna C. Tata

      Krishna C. Tata

      manager - security risk and architecture, Cisco

  9. #HowTo: Secure On-Chain Data

    Despite advancements in blockchain security, we currently live in an awkward time with a high experimentation factor and few security options

    1. Photo of David Schwed

      David Schwed

      COO, Halborn

  10. Cyber-Attacks on UK Councils – Why They Happen and What We Can Do About it

    UK Councils have become a major target for cyber-criminals, and action must be taken to protect these bodies

    1. Photo of Jamie Akhtar

      Jamie Akhtar

      CEO and co-founder, CyberSmart

  11. ‘Last Call’ to Prepare for Two US Privacy Laws

    With only weeks remaining, organizations must ensure they are ready to comply with two US privacy laws going into effect on January 1, 2023

    1. Photo of Scott Allendevaux

      Scott Allendevaux

      Cyberlaw and Policy Analyst, CISSP, HCISPP, CIPP/US, CIPT, CIPM

  12. HowTo: Fight Cyber-Threats in the Metaverse

    Now is the time to invest in training the architects of the Metaverse to navigate its security threats

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  13. Tech Addiction and Work Burnout Make us Prone to Phishing Attacks

    Confronting the issues related to tech addiction will help your organization combat the potential of cyber-attacks

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  14. #HowTo: Build Trust in Your Software Through Insights

    Organizations can benefit from learning from the experiences of peers to improve their software security

    1. Photo of Frank Morris

      Frank Morris

      managing director EMEA & APAC, Synopsys

  15. Cybersecurity Awareness: An Open Letter to CISOs

    Now is the time to focus on long-term behavioral change rather than cybersecurity awareness, says Oz Alashe

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  16. How DDoS Disrupts Live Events

    DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event

  17. #HowTo: Secure Your Cloud Migration

    Organizations must take action to strengthen its security posture amid cloud migration

    1. Photo of David Richardson

      David Richardson

      VP, product, Lookout Inc

  18. What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

    Researchers have observed 10,666 ransomware variations in the past six months

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  19. Cyberwar is Changing – is Your Organization Ready?

    Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare

    1. Photo of Conor Coughlan

      Conor Coughlan

      CMO and Advocacy Officer, Armis

  20. #HowTo: Build Trust Between Developers and Security Teams

    To make software more secure, we must overcome cultural differences between developers and security teams

    1. Photo of Altaz Valani

      Altaz Valani

      director, insights research, Security Compass

What’s hot on Infosecurity Magazine?