Infosecurity Opinions

  1. How to Get Your Staff Onboard with Information Security

    Four ways employers can cultivate a security culture in their organization

    1. Photo of David Cripps

      David Cripps

      Chief Information Security Officer, Moneycorp

  2. Going Global: How the Russian Ransomware Model Could Spread Worldwide

    Will sanctions change the tactics of different ransomware groups?

    1. Photo of Allan Liska

      Allan Liska

      Senior Security Architect and Ransomware Specialist, Recorded Future

  3. Holiday Ready: How Retailers Can Prepare a Gift-Wrapped Availability and Security Framework During the Holiday Period

    Ensuring you withstand retail’s golden period will give you and your teams a silent night

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

  4. #HowTo: Ensure a Healthy and Ransomware-Proof Environment

    What are the best practices for protecting your business from ransomware attacks?

    1. Photo of Sergei Serdyuk

      Sergei Serdyuk

      vp of product management, NAKIVO

  5. The Password Turns 60 This Year, But It's Not Going Away Anytime Soon

    Too many networks, devices, systems and people rely on passwords for the tech to quickly vanish

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  6. What the FBI Hoax Blast Reveals About Email Deception

    Today’s security tools need to understand businesses communications, context and behaviors to combat sophisticated email attacks

    1. Photo of Marcus  Fowler

      Marcus Fowler

      Director of Strategic Threat, Darktrace

  7. 10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

    Organizations must look at their communications tools to ensure total organizational safety and security

    1. Photo of George Waller

      George Waller

      EVP and Co-Founder of StrikeForce Technologies

  8. How Cybersecurity Automation Can Boost Deal Value and Insights in M&A Due Diligence

    Through automation, organizations engaging in M&A can leverage the power of tech, data and intelligence

    1. Photo of Dave Harvey

      Dave Harvey

      Managing Director, FTI Consulting

    2. Photo of Laura Kippin

      Laura Kippin

      Senior Director, FTI Consulting

  9. #HowTo: Protect Customers Using the Latest Authentication Technologies

    Are technologies like behavioral biometrics the answer to rising privacy and security concerns?

    1. Photo of Amir Nooriala

      Amir Nooriala

      CCO, Callsign

  10. Getting Real About Cybersecurity: An Ounce of Cure May Be Worth a Pound of Prevention

    Why preparing to limit the damage of a breach protects our data, customers, employees and companies

    1. Photo of Jay Barbour

      Jay Barbour

      Director of Security Product Management at Masergy

  11. Protecting Against the Danger From Within: How Digital Forensics Can Identify Insider Threats

    Digital forensics will ensure that organizations are not powerless to respond

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  12. Is the Cybersecurity Skills Shortage Really a Resourcing Issue?

    With resources increasingly stretched, it's time to take advantage of automation, improve retention rates and build the IT team of the future

    1. Photo of Kevin Issac

      Kevin Issac

      SVP EMEA Sales, Sophos

  13. Adapting Your IT Service Desk for the Remote or Hybrid World

    With the shift towards hybrid work, infrastructure and operations leaders must adjust how they offer and deliver IT support

    1. Photo of Chris Matchett

      Chris Matchett

      Senior Research Director, Gartner

  14. In Advance of the Metaverse, We Need to Fix Some Pressing Problems With Our Current Digital Civilization

    We require legal ground rules to ensure the metaverse operates in a trustworthy manner

    1. Photo of George S. Takach

      George S. Takach

      Senior Partner at McCarthy-Tétrault

  15. The Facebook Outage and the Case for Cyber-Resilience

    Why cyber-resilience can address outages regardless of cause

    1. Photo of Patricia Muoio

      Patricia Muoio

      General Partner at SineWave Ventures

  16. Decoding Biden's Push for Zero Trust: Why Should the Indian Government Adopt It?

    Biden's effort towards a transformational security model provides a future-ready, cloud-ready, remote-ready cyber policy

    1. Photo of Sandip Kumar  Panda

      Sandip Kumar Panda

      CEO and Co-Founder of Instasafe Technologies

  17. The Evolution of Ransomware Extortion Schemes

    As ransomware groups evolve, organizations cannot risk falling behind and exposing their assets

    1. Photo of Alexander Applegate

      Alexander Applegate

      Senior Threat Researcher, ZeroFOX

  18. 3 Questions Answered About Confidential Computing

    With confidential computing organizations will find creative and useful ways to put their data to work

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  19. Ransomware Hogs the Spotlight, but It's Not the Only Malware to Watch Out For

    Malvertising and scareware are on the rise, injecting their evil plans into your employees' networks

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

What’s hot on Infosecurity Magazine?