Infosecurity Opinions

  1. Why Politically Motivated Cyber-Attacks Are a Threat to Democracy

    Why governments and political parties must work harder to better understand and safeguard their assets

    1. Photo of Brendan Kotze

      Brendan Kotze

      Chief Technology Officer and Co-founder, Performanta

  2. #HowTo: Automate Your Security Processes

    To make the most of automation, it’s important to adopt a holistic approach to your processes and people

    1. Photo of Girish Bhat

      Girish Bhat

      vice president, security, Sumo Logic

  3. Protecting Supply Chains from Highly Contagious Attacks

    Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction

    1. Photo of Amy Nelson

      Amy Nelson

      Chair of PC Client Work Group, Trusted Computing Group

  4. Why Holistic Ecosystems Will Be Central to Future Cybersecurity

    Businesses require an approach comprising both technological and human components

    1. Photo of Helena Nimmo

      Helena Nimmo

      CIO, Endava

  5. The Colonial Pipeline Attack Eight Months On

    Why asset operators need to begin shaping their security programs to protect their most critical assets

    1. Photo of Sachin Shah

      Sachin Shah

      CTO for OT/ICS

  6. Cybersecurity Trends for 2022

    Cybersecurity needs to remain at the front of mind in 2022 as companies look to build on the measures they put in place in 2021

    1. Photo of Cate Pye

      Cate Pye

      Partner, PA Consulting, PA Consulting

  7. Protecting the Most Crucial Software Supply Chain Targets

    How today’s attackers take advantage of software supply chain weaknesses

    1. Photo of Brad LaPorte

      Brad LaPorte

      Advisor - Lionfish Tech Advisors

  8. #HowTo: Solve Your Organization’s Password Woes

    CISOs must perform a careful balancing act – protecting their organization’s systems while not overly inconveniencing or disrupting employees

    1. Photo of Wes Wright

      Wes Wright

      Chief Healthcare Officer, Ordr

  9. How Long Before VPNs Are Mothballed?

    Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core

    1. Photo of Etay Maor

      Etay Maor

      Senior Director of Security Strategy, Cato Networks

  10. The Top 5 Cybersecurity Tools Companies Need to Implement Right Now

    The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

  11. DDoS Attacks Against Online Gamers and the Damaging Ripple Effect

    Why vulnerable and critical industries must further invest in cybersecurity

    1. Photo of Richard Hummel

      Richard Hummel

      ASERT Threat Intelligence Lead at NETSCOUT

  12. QR Security - Are You Ready?

    What are the security concerns surrounding QR codes, and how can these be mitigated?

    1. Photo of Zach Fleming

      Zach Fleming

      Principal Architect, Integrity360

  13. Cybersecurity for the Post-COVID Era

    IT teams need to rethink their cybersecurity strategies for the better

    1. Photo of Martin Riley

      Martin Riley

      Director of Managed Security Services, Bridewell

  14. #HowTo: Measure the Performance of Your Cyber Team

    Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent

    1. Photo of Thomas Mackenzie

      Thomas Mackenzie

      CEO, RankedRight

  15. How to Build and Retain Your Cybersecurity A-Team

    With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever

    1. Photo of Adam Burns

      Adam Burns

      Director of Cybersecurity, Digital Guardian

  16. Cyber-Attacks: Risk Transference as Crucial as Risk Prevention

    How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks

    1. Photo of Steve Prymas

      Steve Prymas

      Chief Information Officer at Embroker

  17. How Businesses Can Stay Ahead of the Christmas Rush

    How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers

    1. Photo of Gal Ringel

      Gal Ringel

      CEO & Co-founder of Mine for Business

  18. How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI

    We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern

    1. Photo of Pavel Osokin

      Pavel Osokin

      Founder and CEO, AMAI

  19. 4 Reasons Why Christmas Is Peak Season for Cyber-Attacks

    Four reasons why and what you can do to protect yourself

    1. Photo of Stephen Crow

      Stephen Crow

      Head of Security & Compliance, UKFast

  20. AI-Powered Malware Doesn't Actually Exist

    Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

    1. Photo of Andrew Patel

      Andrew Patel

      Researcher, Artificial Intelligence Centre of Excellence, F-Secure

What’s hot on Infosecurity Magazine?