Infosecurity Opinions

  1. Insider Threats: Protecting from Within

    Why access, data and awareness are key to minimizing malicious insider threat risk

    1. Photo of Jon Ford

      Jon Ford

      Global Managing Director, Insider Threat Security Solutions, Mandiant

  2. #HowTo: Improve Security Awareness Training

    Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  3. Cybersecurity Risks Around Smart City Development

    Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  4. Will Single Sign-on Ever Become Mainstream?

    For SSO to be mainstream, it's vital to maintain control of identities and user access levels

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  5. The Long and Short Roads to Security Maturity

    Why less mature organizations have a long and hazardous road to travel

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  6. #HowTo: Prevent Insider Threats in Your Organization

    What are the different types of insider threats, and how can they be prevented?

    1. Photo of Tom Eston

      Tom Eston

      AVP of consulting, Bishop Fox

  7. Crime-As-A-Service Is Leveling Up - And Businesses Aren't Prepared

    Crime-as-a-Service is helping cyber-criminals level up their attacks and target organizations with sophisticated tactics

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

  8. Mind the Gap: Moving from Missing Encryption to Ubiquitous Data Security

    How new software addresses the challenge of closing gaps and consolidating complexity into a single, invisible data platform

    1. Photo of Ayal Yogev

      Ayal Yogev

      CEO and Co-Founder, Anjuna Security

  9. Top 3 Mistakes Companies Make With Security and Compliance

    Avoid costly mistakes by establishing suitable systems and protocols to keep your compliance up to date

    1. Photo of Troy Fine

      Troy Fine

      Senior Manager, Drata

  10. Defending DNS Against DDoS Attacks to Protect Reputation, Revenue and Customers

    Why DNS is vulnerable and what companies can do to shore up defenses

    1. Photo of Ryan Davis

      Ryan Davis

      CISO, NS1

  11. #HowTo: Mitigate Cyber-Risks During Financial Milestones

    Cybersecurity needs to be fully integrated into a company's valuation ahead of IPOs, M&As, investments and other financial milestones

    1. Photo of Noy Saban

      Noy Saban

      CFO, CYE

  12. Cyber Vulnerabilities and Safety Risks Across the UK's Digital Railway

    How the rail industry can balance physical security and digital safety to keep the UK rail network secure

    1. Photo of Alex Cowan

      Alex Cowan

      Chief Executive Officer, RazorSecure

  13. Cybersecurity Pros Need a Seat at the Table

    It’s time to move from a business continuity mindset to a business agility mindset

    1. Photo of David Pignolet

      David Pignolet

      President and CEO, SecZetta

  14. The SEC Means Business: Clamping Down on Financial Institution Complacency with Security Practices

    Companies lacking effective policies or failing to follow through on them will see harsh enforcement actions

    1. Photo of Ari Buchler

      Ari Buchler

      Board Director at Simeio

  15. Why a Risk Reset Is Needed for a More Secure, Automated Cyber Future

    Why a risk reset is vital and why there's no better time than now to implement change

    1. Photo of Steve Benton

      Steve Benton

      CSO, BT Security

  16. Securing the Modern Software Supply Chain

    How developers can protect themselves and the wider developer community

    1. Photo of Liran Tal

      Liran Tal

      Director of Developer Advocacy, Snyk

  17. Why It's Time to Talk About Nation-State Attacks...Again

    Why threat intelligence must consider the wider geopolitical landscape more

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  18. How to Get Your Staff Onboard with Information Security

    Four ways employers can cultivate a security culture in their organization

    1. Photo of David Cripps

      David Cripps

      Chief Information Security Officer, Moneycorp

  19. Going Global: How the Russian Ransomware Model Could Spread Worldwide

    Will sanctions change the tactics of different ransomware groups?

    1. Photo of Allan Liska

      Allan Liska

      Senior Security Architect and Ransomware Specialist, Recorded Future

  20. Holiday Ready: How Retailers Can Prepare a Gift-Wrapped Availability and Security Framework During the Holiday Period

    Ensuring you withstand retail’s golden period will give you and your teams a silent night

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

What’s hot on Infosecurity Magazine?