Infosecurity Opinions

  1. Why Holistic Ecosystems Will Be Central to Future Cybersecurity

    Businesses require an approach comprising both technological and human components

    1. Photo of Helena Nimmo

      Helena Nimmo

      CIO, Endava

  2. The Colonial Pipeline Attack Eight Months On

    Why asset operators need to begin shaping their security programs to protect their most critical assets

    1. Photo of Sachin Shah

      Sachin Shah

      CTO for OT/ICS

  3. Cybersecurity Trends for 2022

    Cybersecurity needs to remain at the front of mind in 2022 as companies look to build on the measures they put in place in 2021

    1. Photo of Cate Pye

      Cate Pye

      Partner, PA Consulting, PA Consulting

  4. Protecting the Most Crucial Software Supply Chain Targets

    How today’s attackers take advantage of software supply chain weaknesses

    1. Photo of Brad LaPorte

      Brad LaPorte

      Advisor - Lionfish Tech Advisors

  5. #HowTo: Solve Your Organization’s Password Woes

    CISOs must perform a careful balancing act – protecting their organization’s systems while not overly inconveniencing or disrupting employees

    1. Photo of Wes Wright

      Wes Wright

      Chief Healthcare Officer, Ordr

  6. How Long Before VPNs Are Mothballed?

    Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core

    1. Photo of Etay Maor

      Etay Maor

      Senior Director of Security Strategy, Cato Networks

  7. The Top 5 Cybersecurity Tools Companies Need to Implement Right Now

    The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

  8. DDoS Attacks Against Online Gamers and the Damaging Ripple Effect

    Why vulnerable and critical industries must further invest in cybersecurity

    1. Photo of Richard Hummel

      Richard Hummel

      ASERT Threat Intelligence Lead at NETSCOUT

  9. QR Security - Are You Ready?

    What are the security concerns surrounding QR codes, and how can these be mitigated?

    1. Photo of Zach Fleming

      Zach Fleming

      Principal Architect, Integrity360

  10. Cybersecurity for the Post-COVID Era

    IT teams need to rethink their cybersecurity strategies for the better

    1. Photo of Martin Riley

      Martin Riley

      Director of Managed Security Services, Bridewell

  11. #HowTo: Measure the Performance of Your Cyber Team

    Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent

    1. Photo of Thomas Mackenzie

      Thomas Mackenzie

      CEO, RankedRight

  12. How to Build and Retain Your Cybersecurity A-Team

    With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever

    1. Photo of Adam Burns

      Adam Burns

      Director of Cybersecurity, Digital Guardian

  13. Cyber-Attacks: Risk Transference as Crucial as Risk Prevention

    How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks

    1. Photo of Steve Prymas

      Steve Prymas

      Chief Information Officer at Embroker

  14. How Businesses Can Stay Ahead of the Christmas Rush

    How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers

    1. Photo of Gal Ringel

      Gal Ringel

      CEO & Co-founder of Mine for Business

  15. How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI

    We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern

    1. Photo of Pavel Osokin

      Pavel Osokin

      Founder and CEO, AMAI

  16. 4 Reasons Why Christmas Is Peak Season for Cyber-Attacks

    Four reasons why and what you can do to protect yourself

    1. Photo of Stephen Crow

      Stephen Crow

      Head of Security & Compliance, UKFast

  17. AI-Powered Malware Doesn't Actually Exist

    Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

    1. Photo of Andrew Patel

      Andrew Patel

      Researcher, Artificial Intelligence Centre of Excellence, F-Secure

  18. Cyber Resiliency: Safeguarding Data for Business Continuity

    The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

    1. Photo of Stefan Liesche

      Stefan Liesche

      IBM Distinguished Engineer Cloud Hyper Protect Services, IBM Cloud

  19. Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing

    While innovations are intended for good, hackers lie in wait to capitalize on them

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  20. CBD: Stress Reliever to Stress-Inducing Phishing Scam

    It only takes one careless click for hackers to gain access to a network

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

What’s hot on Infosecurity Magazine?