Infosecurity Opinions

  1. Cyber Resiliency: Safeguarding Data for Business Continuity

    The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

    1. Photo of Stefan Liesche

      Stefan Liesche

      IBM Distinguished Engineer Cloud Hyper Protect Services, IBM Cloud

  2. Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing

    While innovations are intended for good, hackers lie in wait to capitalize on them

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  3. CBD: Stress Reliever to Stress-Inducing Phishing Scam

    It only takes one careless click for hackers to gain access to a network

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  4. Insider Threats: Protecting from Within

    Why access, data and awareness are key to minimizing malicious insider threat risk

    1. Photo of Jon Ford

      Jon Ford

      Global Managing Director, Insider Threat Security Solutions, Mandiant

  5. #HowTo: Improve Security Awareness Training

    Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  6. Cybersecurity Risks Around Smart City Development

    Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  7. Will Single Sign-on Ever Become Mainstream?

    For SSO to be mainstream, it's vital to maintain control of identities and user access levels

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  8. The Long and Short Roads to Security Maturity

    Why less mature organizations have a long and hazardous road to travel

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  9. #HowTo: Prevent Insider Threats in Your Organization

    What are the different types of insider threats, and how can they be prevented?

    1. Photo of Tom Eston

      Tom Eston

      AVP of consulting, Bishop Fox

  10. Crime-As-A-Service Is Leveling Up - And Businesses Aren't Prepared

    Crime-as-a-Service is helping cyber-criminals level up their attacks and target organizations with sophisticated tactics

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

  11. Mind the Gap: Moving from Missing Encryption to Ubiquitous Data Security

    How new software addresses the challenge of closing gaps and consolidating complexity into a single, invisible data platform

    1. Photo of Ayal Yogev

      Ayal Yogev

      CEO and Co-Founder, Anjuna Security

  12. Top 3 Mistakes Companies Make With Security and Compliance

    Avoid costly mistakes by establishing suitable systems and protocols to keep your compliance up to date

    1. Photo of Troy Fine

      Troy Fine

      Senior Manager, Drata

  13. Defending DNS Against DDoS Attacks to Protect Reputation, Revenue and Customers

    Why DNS is vulnerable and what companies can do to shore up defenses

    1. Photo of Ryan Davis

      Ryan Davis

      CISO, NS1

  14. #HowTo: Mitigate Cyber-Risks During Financial Milestones

    Cybersecurity needs to be fully integrated into a company's valuation ahead of IPOs, M&As, investments and other financial milestones

    1. Photo of Noy Saban

      Noy Saban

      CFO, CYE

  15. Cyber Vulnerabilities and Safety Risks Across the UK's Digital Railway

    How the rail industry can balance physical security and digital safety to keep the UK rail network secure

    1. Photo of Alex Cowan

      Alex Cowan

      Chief Executive Officer, RazorSecure

  16. Cybersecurity Pros Need a Seat at the Table

    It’s time to move from a business continuity mindset to a business agility mindset

    1. Photo of David Pignolet

      David Pignolet

      President and CEO, SecZetta

  17. The SEC Means Business: Clamping Down on Financial Institution Complacency with Security Practices

    Companies lacking effective policies or failing to follow through on them will see harsh enforcement actions

    1. Photo of Ari Buchler

      Ari Buchler

      Board Director at Simeio

  18. Why a Risk Reset Is Needed for a More Secure, Automated Cyber Future

    Why a risk reset is vital and why there's no better time than now to implement change

    1. Photo of Steve Benton

      Steve Benton

      CSO, BT Security

  19. Securing the Modern Software Supply Chain

    How developers can protect themselves and the wider developer community

    1. Photo of Liran Tal

      Liran Tal

      Director of Developer Advocacy, Snyk

  20. Why It's Time to Talk About Nation-State Attacks...Again

    Why threat intelligence must consider the wider geopolitical landscape more

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

What’s hot on Infosecurity Magazine?