Infosecurity Opinions

  1. Deep Learning: It's Not Too Good to Be True - It's Genuine Progress

    When something seems too good to be true, it usually is, but not when it comes to deep learning

    1. Photo of Brooks Wallace

      Brooks Wallace

      VP EMEA, Deep Instinct

  2. 2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization

    With a commitment to zero trust and supply chain reporting, public and private organizations will reduce the number of incidents

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iBoss

  3. #HowTo: Solve the UK's Shortage of Cybersecurity Experts

    What are the potential solutions to the UK's lack of cybersecurity professionals?

    1. Photo of Sarah-Jane McQueen

      Sarah-Jane McQueen

      general manager, CoursesOnline

  4. How to Build an Autonomic Security Operations Center (SOC)

    A guide to transforming a SOC’s scale, visibility and automation

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  5. #HowTo: Introduce Advanced Technologies into Your Security Strategy

    Advanced technologies are crucial to combatting modern cyber-threats, but how can they be integrated into your organization?

    1. Photo of Alexander Ivanyuk

      Alexander Ivanyuk

      Senior Director of Product and Technology Positioning, Acronis

  6. Criminal Cryptocurrency Transactions Will Drop by 30% by 2024 - Here's Why

    Avivah Litan, VP research analyst at Gartner, outlines the four key developments why this drop will happen

    1. Photo of Avivah Litan

      Avivah Litan

      Distinguished VP Research Analyst, Gartner

  7. Why Diversity Is Crucial to Bringing Cybersecurity Recruitment Into the 21st Century

    How businesses should re-evaluate their hiring criteria, and how the current industry talent gaps can be navigated

    1. Photo of Ian McShane

      Ian McShane

      Field CTO, Arctic Wolf Networks

  8. Cyber-War Exclusion Clauses in Cyber Insurance

    Why business leaders can no longer rely on insurers to bail them out when hit by ransomware

    1. Photo of Peter Groucutt

      Peter Groucutt

      Managing Director at Databarracks

  9. Why A Fundamental Change in Cybersecurity Is Required

    As people’s lives become more linked to the digital realm, now is the time to move forward with digital safety

    1. Photo of John Goodacre

      John Goodacre

      Director of UKRI's Digital Security by Design

  10. Quantum Encryption: The Basics

    We’re on the verge of a state of 'quantum security' for everyone

    1. Photo of Denis Mandich

      Denis Mandich

      CTO and Co-Founder of Qrypt

  11. #HowTo: Meet the Cyber Jobs Challenge

    Technology solutions that leverage automation, context and the skills your team are key to addressing the cyber skills gap

    1. Photo of Allen McNaughton

      Allen McNaughton

      director of systems engineering, Infoblox

  12. Can High-Security Workers Keep Their Mobile Devices (and Themselves) Safe?

    How high-security organizations can be in a stronger position to monitor and control all employee devices

    1. Photo of Bill Anderson

      Bill Anderson

      President, CIS Mobile

  13. The Cyber-Threat in 2022: Where You Keep Your Data Will Make or Break the Success of an Attack

    Why recent work environment transitions increase the opportunities for cyber-criminals to infiltrate businesses

    1. Photo of Laurance Dine

      Laurance Dine

      Global Partner, X-Force Incident Response, IBM

  14. Knowing What's Best: Breach Prevention or Breach Mitigation?

    Data breaches are accelerating in 2022, and your business could be next

    1. Photo of Trevor Morgan

      Trevor Morgan

      Product Manager at comforte AG

  15. Log4j Showed Us That Public Disclosure Still Helps Attackers

    Why we must ensure we put more robust disclosure processes in place

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  16. #HowTo: Stay on Top of Cyber-Hygiene

    Cyber-hygiene might not be the most exciting security topic, but it’s the most important

    1. Photo of Nik Whitfield

      Nik Whitfield

      chairman and founder, Panaseer

  17. The Cybersecurity Issues We Can't Ignore in 2022

    Why the metaverse will create new cybersecurity vulnerabilities

    1. Photo of Matias  Madou

      Matias Madou

      CTO & Co-founder, Secure Code Warrior

  18. #HowTo: Implement Continuous Compliance for Kubernetes

    What do organizations have to do to maintain compliance with Kubernetes?

    1. Photo of Glen  Kosaka

      Glen Kosaka

      head of product security, SUSE

  19. A Look Back at an Unprecedented Year in Ransomware

    A look back at ransomware through 2021 and how communications tactics have evolved

    1. Photo of Allie Bohan

      Allie Bohan

      Senior Consultant, FTI Consulting

    2. Photo of Orla Cox

      Orla Cox

      Director, FTI Consulting

    3. Photo of Jack Rozier

      Jack Rozier

      Senior Consultant, FTI Consulting

What’s hot on Infosecurity Magazine?