Infosecurity Opinions

  1. #DataPrivacyWeek: The Rise of Ransomware and the Evolving Threat Landscape

    The most effective way to establish a line of defense against ransomware

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  2. Team Talk - Making Sense of Simulated Attack Exercises

    Whatever we choose to call it, the need for adversary-simulated attacks is only going to increase

    1. Photo of Owen  Wright

      Owen Wright

      Managing Director at Context, part of Accenture

  3. #DataPrivacyDay: Key GDPR Compliance Issues to Watch in the Artificial Intelligence Space

    Growing use of AI in business operations triggers privacy and security challenges requiring thoughtful consideration

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Anna Pateraki

      Anna Pateraki

      Associate, Hunton Andrews Kurth LLP

  4. How Automation Can Mitigate the Cybersecurity Skills Gap

    1. Photo of Arun Subbarao

      Arun Subbarao

      Vice President, Engineering and Technology, at Lynx

  5. Why the Assure Scheme Is Still Getting off the Ground in the Aviation Sector

    Why the new ASSURE cybersecurity scheme is experiencing teething problems

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  6. #DataPrivacyWeek: Data Privacy vs. Visibility: The Security Consideration

    How organizations can ensure the security of their IoT and cloud environments with deep data observability

    1. Photo of Adrian Rowley

      Adrian Rowley

      Senior Director, Gigamon

  7. Identity Theft Will Get Worse

    Why organizations need to enhance their approach to identity verification

    1. Photo of James Mirfin

      James Mirfin

      Global Head of Digital Identity & Fraud Solutions at Refinitiv

  8. #DataPrivacyWeek: The Best Kept Secrets About Data Privacy

    Why innovation in data privacy can improve value for businesses and consumers alike

    1. Photo of Shira Landau

      Shira Landau

      Content Marketing Manager, Check Point Software Technologies

  9. #HowTo: Evaluate Your Cyber Insurance

    Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention

    1. Photo of Michael Carr

      Michael Carr

      Head of Risk Engineering, US & Canada, Coalition

  10. The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

    This new democratization of hacking tools means that no business is safe

    1. Photo of Matthew Gracey-McMinn

      Matthew Gracey-McMinn

      Head of Threat Research

  11. Tackling Misconceptions of Mobile-Based Authentication

    The importance of the security and ease-of-use credentials of mobile-based one-time passcodes

    1. Photo of Nic Sarginson

      Nic Sarginson

      Principal Solutions Engineer, Yubico

  12. Why Zero Trust is the Best Defence for our Digital Food Supply Chain

    A zero trust, best-practice approach is key to protecting critical food supply infrastructure

    1. Photo of James Sinton

      James Sinton

      Technology Platform Manager of IMS Evolve

  13. The Future of Cloud-Native in a Brave New World

    How IT teams can utilize the full benefits of cloud-native while significantly lowering the risk

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

  14. Smart City Development Is Pushing Video Surveillance to the Cloud

    Shifting surveillance to the cloud requires increased access to crucial real-time data

    1. Photo of David Friend

      David Friend

      CEO and Co-Founder, Wasabi Technologies

  15. #HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

    It usually takes less than 10 minutes to score a company’s security based on their public information

    1. Photo of Patrick Walsh

      Patrick Walsh

      CEO, IronCore Labs

  16. GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors

    Several tips for SaaS companies to navigate the updated regulations

    1. Photo of Christeene  Alcosiba

      Christeene Alcosiba

      Senior product manager and ERG leader at Salesloft

    2. Photo of Vicki Reyzelman

      Vicki Reyzelman

      Director of Product Management at Salesloft

  17. Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

    Three identity security practices that are fundamental to the success of a zero trust strategy

    1. Photo of Eric Anderson

      Eric Anderson

      Enterprise Security, Adobe

  18. Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected

    Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection

    1. Photo of Avital Sincai

      Avital Sincai

      COO at Cydome

  19. Stop Purchasing, Start Developing: Why Hiring for Tech in 2022 Will Look Very Different

    Why cyber reskilling and upskilling are key to keeping organizations safe

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  20. Defense Against the Dark Arts: Learnings From the Magical World to Boost Your AppSec

    How businesses can guard against the threat actors who are cursing, jinxing and charming their way past security defenses

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

What’s hot on Infosecurity Magazine?