Infosecurity Opinions

  1. Cyber Skills Shortage is Caused by Analyst Burnout

    We have to work smarter and treat current industry professionals better to solve the cyber skills shortage

    1. Photo of Matt Lawrence

      Matt Lawrence

      head of defensive security, JUMPSEC

  2. #HowTo: Prepare for the Worst in Cybersecurity

    Under new regulations, financial services organizations and their suppliers need to prepare for when (not if) a cyber-attack happens

    1. Photo of Adam  Stringer

      Adam Stringer

      Partner & Head of Cyber, Privacy & Operational Resilience in Financial Services, PA Consulting

  3. #CyberMonth: Staying Cyber Secure in an Increasingly Hostile Digital Environment

    Organizations can do more to ensure teams are more cyber-aware this Cybersecurity Awareness Month

    1. Photo of Andy Bates

      Andy Bates

      practice director - security, Node4

  4. #HowTo: Get an Attacker’s Eye View of Your Security

    Mimicking an attacker’s eye view of your network will complement your existing traditional approach to security

    1. Photo of Paul Baird

      Paul Baird

      Chief technical security officer, Qualys

  5. #CyberMonth: What Every Employer Needs to Know About Passwords

    Passwords remain key, and organizations must take steps to ensure they are as secure as possible

    1. Photo of Itay Saraf

      Itay Saraf

      cyber security expert, CYE

    2. Photo of Max Shlochiski

      Max Shlochiski

      cyber security expert, CYE

  6. #HowTo: Protect COVID-19 Data from Breaches and Theft

    Fighting COVID-19 meant gathering, storing and organizing a huge volume of data, increasing the risk of breaches

    1. Photo of Neal Brenner

      Neal Brenner

      CIO, SSG

  7. What Telcos Should Learn from the Optus Breach

    Telcos must be aware of their API security risks following the recent Optus breach

    1. Photo of Adam Fisher

      Adam Fisher

      solutions architect, Salt Security

  8. Meaningful Learnings from the Uber Breach

    What lessons should cybersecurity professionals take from the recent Uber breach?

    1. Photo of Rich  Turner

      Rich Turner

      Senior Vice-President EMEA, CyberArk

  9. #HowTo: Keep Universities Secure in Today’s Cyber Threat Environment

    With universities welcoming a new student intake this month, they must be prepared to face a deluge of cyber-attacks

    1. Photo of Steve Bradford

      Steve Bradford

      senior vice president EMEA, SailPoint

  10. #HowTo: Defend the Legal Sector from Insider Threats

    Figures show that the real cyber-threat to legal firms lies close to home

    1. Photo of Kerri Dearing

      Kerri Dearing

      head of international business, NetDocuments

  11. Cybersecurity Vulnerabilities: The Race to Patch

    Organizations should question whether they have the resources to continuously monitor and triage third-party cyber risk

    1. Photo of Robert Hannigan

      Robert Hannigan

      Chairman, International Business - BlueVoyant

  12. Five Myths About Cybercrime and Cybersecurity

    It is essential to bust common myths about cybercrime

    1. Photo of David Steele

      David Steele

      MD & principal security consultant, SecuriCentrix

  13. #HowTo: Enhance Data Security and Privacy

    Prevention strategies and strong incident response plans will enable resilience and reduce the overall business impact of a breach

    1. Photo of Gráinne Bryan

      Gráinne Bryan

      senior managing director, FTI Consulting

    2. Photo of Nina Bryant

      Nina Bryant

      Managing Director, FTI Consulting

    3. Photo of Dave Harvey

      Dave Harvey

      Managing Director, FTI Consulting

  14. #HowTo: Prove Identity Security ROI to Boards as a CISO

    CISOs must learn how to persuade the board to invest in cybersecurity

    1. Photo of Damir Brescic

      Damir Brescic

      cybersecurity executive advisor and strategic partner, Authomize

  15. How Geopolitical Tension Creates Opportunities for Cyber-Criminals

    DDoS attacks are increasingly being incorporated into the arsenal for geopolitical protests and warfare

    1. Photo of Philippe Alcoy

      Philippe Alcoy

      APAC security technologies, NETSCOUT

  16. #HowTo: Secure Your Kubernetes Environments

    Kubernetes security needs to extend well beyond pre-deployment to encompass the environment in runtime

    1. Photo of James Brown

      James Brown

      senior vice president, customer success, Lacework

  17. #HowTo: Approach IoMT Security and Risk Management

    Healthcare security teams face unique challenges in protecting IoT devices

    1. Photo of Constancio Fernandes

      Constancio Fernandes

      VP of engineering, Asimily

  18. Are We Doing Enough to Protect Our NHS?

    Five years on from the WannaCry ransomware attack that hit the UK's NHS, is the organization's cybersecurity posture sufficient?

    1. Photo of James Cunningham

      James Cunningham

      CEO and co-founder, Core to Cloud

  19. #HowTo: Find the Right SOC Provider

    Organizations need to find a partner who goes beyond the typical managed SOC commercial relationship

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  20. UX Design is Key to Creating Privacy Controls that Unlock Value 

    It’s vital to provide clear journeys for customers to choose how their data is used

    1. Photo of Elizabeth Garside

      Elizabeth Garside

      customer experience expert, PA Consulting

    2. Photo of Elisabeth Mackay

      Elisabeth Mackay

      privacy and cyber security expert, PA Consulting

What’s hot on Infosecurity Magazine?