Infosecurity Opinions

  1. #HowTo: Ensure a Healthy and Ransomware-Proof Environment

    What are the best practices for protecting your business from ransomware attacks?

    1. Photo of Sergei Serdyuk

      Sergei Serdyuk

      vp of product management, NAKIVO

  2. The Password Turns 60 This Year, But It's Not Going Away Anytime Soon

    Too many networks, devices, systems and people rely on passwords for the tech to quickly vanish

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  3. What the FBI Hoax Blast Reveals About Email Deception

    Today’s security tools need to understand businesses communications, context and behaviors to combat sophisticated email attacks

    1. Photo of Marcus  Fowler

      Marcus Fowler

      Director of Strategic Threat, Darktrace

  4. 10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

    Organizations must look at their communications tools to ensure total organizational safety and security

    1. Photo of George Waller

      George Waller

      EVP and Co-Founder of StrikeForce Technologies

  5. How Cybersecurity Automation Can Boost Deal Value and Insights in M&A Due Diligence

    Through automation, organizations engaging in M&A can leverage the power of tech, data and intelligence

    1. Photo of Dave Harvey

      Dave Harvey

      Managing Director, FTI Consulting

    2. Photo of Laura Kippin

      Laura Kippin

      Senior Director, FTI Consulting

  6. #HowTo: Protect Customers Using the Latest Authentication Technologies

    Are technologies like behavioral biometrics the answer to rising privacy and security concerns?

    1. Photo of Amir Nooriala

      Amir Nooriala

      CCO, Callsign

  7. Getting Real About Cybersecurity: An Ounce of Cure May Be Worth a Pound of Prevention

    Why preparing to limit the damage of a breach protects our data, customers, employees and companies

    1. Photo of Jay Barbour

      Jay Barbour

      Director of Security Product Management at Masergy

  8. Protecting Against the Danger From Within: How Digital Forensics Can Identify Insider Threats

    Digital forensics will ensure that organizations are not powerless to respond

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  9. Is the Cybersecurity Skills Shortage Really a Resourcing Issue?

    With resources increasingly stretched, it's time to take advantage of automation, improve retention rates and build the IT team of the future

    1. Photo of Kevin Issac

      Kevin Issac

      SVP EMEA Sales, Sophos

  10. Adapting Your IT Service Desk for the Remote or Hybrid World

    With the shift towards hybrid work, infrastructure and operations leaders must adjust how they offer and deliver IT support

    1. Photo of Chris Matchett

      Chris Matchett

      Senior Research Director, Gartner

  11. In Advance of the Metaverse, We Need to Fix Some Pressing Problems With Our Current Digital Civilization

    We require legal ground rules to ensure the metaverse operates in a trustworthy manner

    1. Photo of George S. Takach

      George S. Takach

      Senior Partner at McCarthy-Tétrault

  12. The Facebook Outage and the Case for Cyber-Resilience

    Why cyber-resilience can address outages regardless of cause

    1. Photo of Patricia Muoio

      Patricia Muoio

      General Partner at SineWave Ventures

  13. Decoding Biden's Push for Zero Trust: Why Should the Indian Government Adopt It?

    Biden's effort towards a transformational security model provides a future-ready, cloud-ready, remote-ready cyber policy

    1. Photo of Sandip Kumar  Panda

      Sandip Kumar Panda

      CEO and Co-Founder of Instasafe Technologies

  14. The Evolution of Ransomware Extortion Schemes

    As ransomware groups evolve, organizations cannot risk falling behind and exposing their assets

    1. Photo of Alexander Applegate

      Alexander Applegate

      Senior Threat Researcher, ZeroFOX

  15. 3 Questions Answered About Confidential Computing

    With confidential computing organizations will find creative and useful ways to put their data to work

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  16. Ransomware Hogs the Spotlight, but It's Not the Only Malware to Watch Out For

    Malvertising and scareware are on the rise, injecting their evil plans into your employees' networks

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  17. #HowTo: Protect Critical Infrastructure from Cyber-Criminals

    Given today’s cyber-threat landscape, critical infrastructure enterprises should be looking to adopt increasingly flexible and varied security solutions

    1. Photo of Mo Cashman

      Mo Cashman

      enterprise security architect and principal engineer, McAfee

  18. Security and Compliance Risks Associated With the Merger and Acquisition Process

    Mergers and acquisitions provide new processes and technologies that can mitigate risks

    1. Photo of Verity Chinnery

      Verity Chinnery

      Senior Director of GRC Implementations, SureCloud

  19. The 5 Golden Rules of Cyber-War

    Cyberspace is now the 5th domain of warfare recognized by NATO alongside land, air, sea and space

    1. Photo of Erwan Keraudy

      Erwan Keraudy

      CEO, CybelAngel

What’s hot on Infosecurity Magazine?