Infosecurity Opinions

  1. #HowTo: Stay Cyber-Secure This Summer

    Chris Harris offers safe practices holiday-goers should follow this summer

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  2. #HowTo: Overcome Burnout in Cybersecurity Teams

    Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk

    1. Photo of Fabien Rech

      Fabien Rech

      VP EMEA, Trellix

  3. The Needle is Shifting on Post-Quantum Security – Here’s What You Need to Know

    Businesses now have the tools they need to begin thinking about migrating to new post-quantum standards

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  4. HowTo: Level Up MSPs’ Cybersecurity

    MSPs that monitor, deploy and respond will be a step ahead of their competitors

    1. Photo of Gregg Lalle

      Gregg Lalle

      SVP International Sales, ConnectWise

  5. Is There a Weak Link in Your Supply Chain?

    The supply chain is only secure when all entities carry out effective, coordinated security measures

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  6. #HowTo: Plug Data Leaks

    While companies are faced with more risks, taking a proactive approach is key to stopping a data leak from causing a major incident

    1. Photo of Todd Carroll

      Todd Carroll

      CISO, CybelAngel

  7. Applying Infosecurity Principles and Practices to Cognitive Security

    How many of the concepts and TTPs developed in cybersecurity can be applied to CogSec

    1. Photo of Max Lesser

      Max Lesser

      Volunteer, DISARM

    2. Photo of SJ Terp

      SJ Terp

      Chief Scientist, DISARM

  8. Is Open Source the Greatest Path to Security?

    Open source offers real security benefits to organizations, but also carries significant risks

    1. Photo of Darren  Prehaye

      Darren Prehaye

      senior solutions architect, Digital Catapult

  9. How Humans Can Positively Interact with Technology

    Technology has been developing rapidly but society has struggled to keep up. People now find themselves exploited

    1. Photo of Marie Oldfield

      Marie Oldfield

      Director, Oldfield Consultancy

  10. #HowTo: Demystify the NIST Cybersecurity Framework

    The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines

    1. Photo of Cam Roberson

      Cam Roberson

      vice president, Beachhead Solutions

  11. How to Keep Your CMS Safe and Secure

    Unless properly secured, a CMS can open the door to bad operators

    1. Photo of Sebastian Gierlinger

      Sebastian Gierlinger

      VP of developer experience, Storyblok

  12. Only More Secure Coding Can Protect the Software Supply Chain

    How developers can build more secure coding and increase industry awareness of the issue

    1. Photo of Elad Leon

      Elad Leon

      Senior CTI expert, CYE

  13. California's Child Privacy Protections Could Be Thorn in Stalkerware's Side

    California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat

    1. Photo of David Ruiz

      David Ruiz

      Senior Threat Content Writer, Malwarebytes

  14. Why the Password Is Not Dead

    Why passwords are here to stay as the core of personal digital security

    1. Photo of Craig Lurey

      Craig Lurey

      CTO and Co-Founder, Keeper Security

  15. European Commission Acknowledges the Evolving Threat Landscape

    Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more

    1. Photo of Carlos Morales

      Carlos Morales

      SVP, Solutions, Neustar

  16. #HowTo: Build Awareness and Best Practices into Your Company and Development Culture

    How can organizations change security from a defensive tax model to an offensive mode?

    1. Photo of Jenn Reed

      Jenn Reed

      CISO, Aviatrix

  17. Protecting the Three Dimensions of the Data Lifecycle

    To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle

    1. Photo of Shashi Kiran

      Shashi Kiran

      CMO, Fortanix

  18. Solving the Gen-N Security Dilemma

    The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks

    1. Photo of Simon  Wilson

      Simon Wilson

      CTO, UK and Ireland, Aruba Networks

  19. #HowTo: Eradicate Plaintext Data Breaches

    Organizations that encrypt everything can protect sensitive information even in the event of a data leak

    1. Photo of Shane Curran

      Shane Curran

      founder and CEO, Evervault

  20. #HowTo: Protect Your Organization From the Increasing Threat of Ransomware

    Organizations need to implement stronger cyber-defenses to tackle threat of ransomware

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

What’s hot on Infosecurity Magazine?