Infosecurity Opinions

  1. How to Begin Proactive Threat Hunting

    The four key success factors of proactive threat hunting are VIMP – visibility, intelligence, machine learning and people

    1. Photo of Henry  Hon

      Henry Hon

      Manager (Cyber Defense), KPMG

  2. #HowTo: Get Cyber Essentials Certified

    January 2022 saw significant changes to the Cyber Essentials certification, and organizations need to act to implement them

    1. Photo of Karl Alderton

      Karl Alderton

      technical account manager, Qualys

  3. WFH - A Remote Prospect for Infosec Professionals?

    Hybrid working seems set to become the norm but will security professionals be excluded given the nature of their role?

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  4. Ransomware Through the Supply Chain: Are Organizations Prepared for the New Normal?

    Why it’s imperative organizations know where they fall in the supply chain to defend against attacks

    1. Photo of Ryan Kovar

      Ryan Kovar

      Distinguished Security Strategist and Leader of SURGe, Splunk

  5. Light at the End of the Ransomware Tunnel?

    Insurance demands, state sanctions and reporting requirements will lead to the evolution of a new type of threat that only cyber resilience can meet.

    1. Photo of James Blake

      James Blake

      Field CISO, Rubrik

  6. Never-Mind the Gap: It Isn't Skills We're Short Of, It's Common Sense

    To solve the cyber skills shortage, enterprises must invest in future professionals, look at existing ssets and ensure they use the right tools

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  7. Top 3 Ways Hackers Get Into Your Supplier's Network to Launch a Supply Chain Attack

    From launching phishing attacks to taking advantage of negligent employees

    1. Photo of Jonathan Wood

      Jonathan Wood

      CEO, C2 Cyber

  8. Why the Cybersecurity Industry Needs to Change Its Siloed Perception

    Why the cybersecurity industry needs to correct the evident gender disparity

    1. Photo of Heather Hinton

      Heather Hinton

      Chief Information Security Officer, RingCentral

  9. #HowTo: Build The Right Skills to Become a CISO

    To become a CISO, you need a wide range of skills

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  10. Investigate and Recover From Ransomware Attacks With Digital Forensics

    How organizations can use digital forensics to assess damage, stop the spread and facilitate recovery

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  11. Defending Against Cyber-Threats – Think Like an Attacker

    As UK businesses face increased risk of a cyber-attack, here are steps they need to take to lessen the threat

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  12. Why It's a Great Time to Be a Mobile Threat

    As mobile devices become more important, hackers are seizing on a vulnerable blindspot in the enterprise attack surface

    1. Photo of Ashish Patel

      Ashish Patel

      General Manager - EMEA, Zimperium

  13. Securing Enterprise Data While Enabling Remote Working

    How we can take measures to reduce our exposure to attacks and avoid being exploited

    1. Photo of Nathan Turajski

      Nathan Turajski

      Senior Director, Informatica

  14. #IWD2022: Women in Cybersecurity: Why We Need to Inspire the Younger Generation

    Is enough being done to close the gender gap and encourage women to join an industry?

    1. Photo of Kirsten Scott

      Kirsten Scott

      Account Director, Code Red Security PR Network

  15. A Critical Component of a Layered Approach to Cybersecurity: SIEMaaS

    Embracing a layered approach to cybersecurity will give your organization an edge in the fight against cyber-threats

    1. Photo of Sean Martin

      Sean Martin

      Director of Product Strategy, CSI Business Solutions

  16. Cameras, Video Analytics and Legislation: Top Video Privacy Trends of 2022

    Legislation worldwide needs to keep evolving while still allowing companies to innovate.

    1. Photo of Simon Randall

      Simon Randall

      Founder and CEO of Pimloc

  17. #HowTo: Prepare for the Future of Electronic Identities

    Not everyone is prepared to take the leap and there is still some hesitancy around eID

    1. Photo of Michael Magrath

      Michael Magrath

      vice president, global regulations and standards, OneSpan

  18. Deep Learning: It's Not Too Good to Be True - It's Genuine Progress

    When something seems too good to be true, it usually is, but not when it comes to deep learning

    1. Photo of Brooks Wallace

      Brooks Wallace

      VP EMEA, Deep Instinct

  19. 2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization

    With a commitment to zero trust and supply chain reporting, public and private organizations will reduce the number of incidents

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iBoss

  20. #HowTo: Solve the UK's Shortage of Cybersecurity Experts

    What are the potential solutions to the UK's lack of cybersecurity professionals?

    1. Photo of Sarah-Jane McQueen

      Sarah-Jane McQueen

      general manager, CoursesOnline

What’s hot on Infosecurity Magazine?