Infosecurity Opinions

  1. What Does a 5G Cyber-Attack Look Like?

    5G signals a huge change in the way we manage connected infrastructure

    1. Photo of Tim Hardwick

      Tim Hardwick

      Managed Solutions & Consulting Lead, EMEA, Spirent

  2. Knowledge Sharing: Breaking Down Real-World Attacks to Learn for the Future

    When we balance the knowns and unknowns, we stand the best chance of winning not just the battle but the war

    1. Photo of Len Noe

      Len Noe

      Technical Evangelist/Whitehat Hacker, CyberArk

  3. Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tighten

    As quantum computing becomes commercially available, the cybersecurity workforce must increase to meet demand

    1. Photo of Nils Gerhardt

      Nils Gerhardt

      Chief Technology Officer, Utimaco

  4. Digging Into the Science of Behaviour to Tackle Cyber Extortion

    When building a strategy to tackle cyber extortion, it is crucial to remember the complexity of human behavior

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  5. #HowTo: Create a Cyber Maturity Strategy

    Cyber maturity has become a crucial component in enabling revenue growth and product innovation as part of a holistic digital business strategy

    1. Photo of Maninder Singh

      Maninder Singh

      Corporate Vice President and Global Head of Cybersecurity & GRC Services, HCL Technologies

  6. Resilient Futures: A Blueprint for Securing Society in 2022 and Beyond

    How vendors, policymakers and technical agencies can deal with the menace of cybercrime

    1. Photo of Rodrigo Jazinski

      Rodrigo Jazinski

      CTO, CyberSmart

    2. Photo of Sam Soares

      Sam Soares

      Chief Growth Officer, CyberSmart

  7. Why Mobile Protection Is a Critical Piece of Your Security Puzzle

    Why IT teams must take certain measures to protect employee mobile devices

    1. Photo of Chester Wisniewski

      Chester Wisniewski

      Principal Research Scientist, Sophos

  8. Ransomcloud: Ransomware's Latest Manifestation Targets the Cloud

    With companies transferring digital assets to the cloud, cyber-criminals are leveraging ‘ransomcloud’ attacks

    1. Photo of Scott Orton

      Scott Orton

      Senior Cloud Security Consultant at Adarma

  9. In Case of Crisis: Third-Party Risk Across Three Dimensions

    Do you have the visibility you need to be prepared?

    1. Photo of Chris Britton

      Chris Britton

      General Manager, RockDove Solutions

  10. How to Manage Patching in Infrastructure to Protect Against Cyber-Attacks?

    Managing risks in critical systems and protecting against cyber-attacks

    1. Photo of Keith Chappell

      Keith Chappell

      Cybersecurity Expert, PA Consulting

  11. COVID-19, The Silent Hacker

    It's time to put in place a system that empowers flexibility in working without driving support teams into ground

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  12. #HowTo: Protect Your Company From Magecart Attacks

    As Magecart attacks surge amid increased e-commerce transactions, investing in web application security has never been more important

    1. Photo of Hadar Blutrich

      Hadar Blutrich

      CTO, Source Defense

  13. Redefining Ransomware – Why Confronting Cybercrime Starts With a War of Words

    Ransomware has a clear definition and one that, in a world of growing digital complexity, matters

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense, Orange Cyberdefense

  14. National Cybersecurity Strategies Are Under Pressure and Innovation Remains Key to Protection

    How prioritizing the latest tech innovations will remain a key focus for many months to come

    1. Photo of Danny Lopez

      Danny Lopez

      CEO, Glasswall Solutions

  15. Are Protection Payments the Future of Ransomware?

    Ransomware gangs are persistent, innovative and playing a long-term game – defenders must do the same!

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  16. #HowTo: Create a More Diverse Cybersecurity Team

    Diversifying the talent pipeline will expand the talent pipeline and help build a healthier cybersecurity culture

    1. Photo of Lisa Jones-Huff

      Lisa Jones-Huff

      senior director, head of global security specialist team, Elasticsearch Ltd

  17. The 'Silver Lining' to Ransomware Attacks on Businesses in an Increasingly Hostile World

    The resilience gained from past attacks should be seen as a silver lining in the face of graver dangers

    1. Photo of Elad Sherf

      Elad Sherf

      Global Head of Cyber Defence, Performanta

  18. Know Your Ransomware Enemy: Getting Inside the Mind of a Hacker

    Faced with the reality that it’s no longer a case of if, but when attackers strike, IT teams face a mission-critical task

    1. Photo of Andy Fernandez

      Andy Fernandez

      Senior Manager - Product Marketing, Zerto

  19. 5 Levers Lawmakers Can Use to Tackle Cybercrime

    The ISF's cybersecurity framework allows policymakers, legislators and law enforcement agencies to better grasp the dynamics behind cybercrime

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  20. Supply Chain Attacks Are Increasing – Organizations Must Evolve

    The old ways of protecting your most valuable assets aren’t working anymore, and it’s time to evolve

    1. Photo of Patrick Tickle

      Patrick Tickle

      CEO, SecureLink

What’s hot on Infosecurity Magazine?