Infosecurity Opinions

  1. How Automation Can Mitigate the Cybersecurity Skills Gap

    1. Photo of Arun Subbarao

      Arun Subbarao

      Vice President, Engineering and Technology, at Lynx

  2. Why the Assure Scheme Is Still Getting off the Ground in the Aviation Sector

    Why the new ASSURE cybersecurity scheme is experiencing teething problems

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  3. #DataPrivacyWeek: Data Privacy vs. Visibility: The Security Consideration

    How organizations can ensure the security of their IoT and cloud environments with deep data observability

    1. Photo of Adrian Rowley

      Adrian Rowley

      Senior Director, Gigamon

  4. Identity Theft Will Get Worse

    Why organizations need to enhance their approach to identity verification

    1. Photo of James Mirfin

      James Mirfin

      Global Head of Digital Identity & Fraud Solutions at Refinitiv

  5. #DataPrivacyWeek: The Best Kept Secrets About Data Privacy

    Why innovation in data privacy can improve value for businesses and consumers alike

    1. Photo of Shira Landau

      Shira Landau

      Content Marketing Manager, Check Point Software Technologies

  6. #HowTo: Evaluate Your Cyber Insurance

    Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention

    1. Photo of Michael Carr

      Michael Carr

      Head of Risk Engineering, US & Canada, Coalition

  7. The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

    This new democratization of hacking tools means that no business is safe

    1. Photo of Matthew Gracey-McMinn

      Matthew Gracey-McMinn

      Head of Threat Research

  8. Tackling Misconceptions of Mobile-Based Authentication

    The importance of the security and ease-of-use credentials of mobile-based one-time passcodes

    1. Photo of Nic Sarginson

      Nic Sarginson

      Principal Solutions Engineer, Yubico

  9. Why Zero Trust is the Best Defence for our Digital Food Supply Chain

    A zero trust, best-practice approach is key to protecting critical food supply infrastructure

    1. Photo of James Sinton

      James Sinton

      Technology Platform Manager of IMS Evolve

  10. The Future of Cloud-Native in a Brave New World

    How IT teams can utilize the full benefits of cloud-native while significantly lowering the risk

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

  11. Smart City Development Is Pushing Video Surveillance to the Cloud

    Shifting surveillance to the cloud requires increased access to crucial real-time data

    1. Photo of David Friend

      David Friend

      CEO and Co-Founder, Wasabi Technologies

  12. #HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

    It usually takes less than 10 minutes to score a company’s security based on their public information

    1. Photo of Patrick Walsh

      Patrick Walsh

      CEO, IronCore Labs

  13. GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors

    Several tips for SaaS companies to navigate the updated regulations

    1. Photo of Christeene  Alcosiba

      Christeene Alcosiba

      Senior product manager and ERG leader at Salesloft

    2. Photo of Vicki Reyzelman

      Vicki Reyzelman

      Director of Product Management at Salesloft

  14. Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

    Three identity security practices that are fundamental to the success of a zero trust strategy

    1. Photo of Eric Anderson

      Eric Anderson

      Enterprise Security, Adobe

  15. Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected

    Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection

    1. Photo of Avital Sincai

      Avital Sincai

      COO at Cydome

  16. Stop Purchasing, Start Developing: Why Hiring for Tech in 2022 Will Look Very Different

    Why cyber reskilling and upskilling are key to keeping organizations safe

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  17. Defense Against the Dark Arts: Learnings From the Magical World to Boost Your AppSec

    How businesses can guard against the threat actors who are cursing, jinxing and charming their way past security defenses

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

  18. Why Politically Motivated Cyber-Attacks Are a Threat to Democracy

    Why governments and political parties must work harder to better understand and safeguard their assets

    1. Photo of Brendan Kotze

      Brendan Kotze

      Chief Technology Officer and Co-founder, Performanta

  19. #HowTo: Automate Your Security Processes

    To make the most of automation, it’s important to adopt a holistic approach to your processes and people

    1. Photo of Girish Bhat

      Girish Bhat

      vice president, security, Sumo Logic

  20. Protecting Supply Chains from Highly Contagious Attacks

    Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction

    1. Photo of Amy Nelson

      Amy Nelson

      Chair of PC Client Work Group, Trusted Computing Group

What’s hot on Infosecurity Magazine?