Infosecurity Opinions

  1. Are We Doing Enough to Protect Our NHS?

    Five years on from the WannaCry ransomware attack that hit the UK's NHS, is the organization's cybersecurity posture sufficient?

    1. Photo of James Cunningham

      James Cunningham

      CEO and co-founder, Core to Cloud

  2. #HowTo: Find the Right SOC Provider

    Organizations need to find a partner who goes beyond the typical managed SOC commercial relationship

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  3. UX Design is Key to Creating Privacy Controls that Unlock Value 

    It’s vital to provide clear journeys for customers to choose how their data is used

    1. Photo of Elizabeth Garside

      Elizabeth Garside

      customer experience expert, PA Consulting

    2. Photo of Elisabeth Mackay

      Elisabeth Mackay

      privacy and cyber security expert, PA Consulting

  4. #HowTo: Stay Cyber-Secure This Summer

    Chris Harris offers safe practices holiday-goers should follow this summer

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  5. #HowTo: Overcome Burnout in Cybersecurity Teams

    Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk

    1. Photo of Fabien Rech

      Fabien Rech

      VP EMEA, Trellix

  6. The Needle is Shifting on Post-Quantum Security – Here’s What You Need to Know

    Businesses now have the tools they need to begin thinking about migrating to new post-quantum standards

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  7. HowTo: Level Up MSPs’ Cybersecurity

    MSPs that monitor, deploy and respond will be a step ahead of their competitors

    1. Photo of Gregg Lalle

      Gregg Lalle

      SVP International Sales, ConnectWise

  8. Is There a Weak Link in Your Supply Chain?

    The supply chain is only secure when all entities carry out effective, coordinated security measures

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  9. #HowTo: Plug Data Leaks

    While companies are faced with more risks, taking a proactive approach is key to stopping a data leak from causing a major incident

    1. Photo of Todd Carroll

      Todd Carroll

      CISO, CybelAngel

  10. Applying Infosecurity Principles and Practices to Cognitive Security

    How many of the concepts and TTPs developed in cybersecurity can be applied to CogSec

    1. Photo of Max Lesser

      Max Lesser

      Volunteer, DISARM

    2. Photo of SJ Terp

      SJ Terp

      Chief Scientist, DISARM

  11. Is Open Source the Greatest Path to Security?

    Open source offers real security benefits to organizations, but also carries significant risks

    1. Photo of Darren  Prehaye

      Darren Prehaye

      senior solutions architect, Digital Catapult

  12. How Humans Can Positively Interact with Technology

    Technology has been developing rapidly but society has struggled to keep up. People now find themselves exploited

    1. Photo of Marie Oldfield

      Marie Oldfield

      Director, Oldfield Consultancy

  13. #HowTo: Demystify the NIST Cybersecurity Framework

    The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines

    1. Photo of Cam Roberson

      Cam Roberson

      vice president, Beachhead Solutions

  14. How to Keep Your CMS Safe and Secure

    Unless properly secured, a CMS can open the door to bad operators

    1. Photo of Sebastian Gierlinger

      Sebastian Gierlinger

      VP of developer experience, Storyblok

  15. Only More Secure Coding Can Protect the Software Supply Chain

    How developers can build more secure coding and increase industry awareness of the issue

    1. Photo of Elad Leon

      Elad Leon

      Senior CTI expert, CYE

  16. California's Child Privacy Protections Could Be Thorn in Stalkerware's Side

    California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat

    1. Photo of David Ruiz

      David Ruiz

      Senior Threat Content Writer, Malwarebytes

  17. Why the Password Is Not Dead

    Why passwords are here to stay as the core of personal digital security

    1. Photo of Craig Lurey

      Craig Lurey

      CTO and Co-Founder, Keeper Security

  18. European Commission Acknowledges the Evolving Threat Landscape

    Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more

    1. Photo of Carlos Morales

      Carlos Morales

      SVP, Solutions, Neustar

  19. #HowTo: Build Awareness and Best Practices into Your Company and Development Culture

    How can organizations change security from a defensive tax model to an offensive mode?

    1. Photo of Jenn Reed

      Jenn Reed

      CISO, Aviatrix

  20. Protecting the Three Dimensions of the Data Lifecycle

    To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle

    1. Photo of Shashi Kiran

      Shashi Kiran

      CMO, Fortanix

What’s hot on Infosecurity Magazine?