Infosecurity Opinions

  1. #HowTo: Protect Critical Infrastructure from Cyber-Criminals

    Given today’s cyber-threat landscape, critical infrastructure enterprises should be looking to adopt increasingly flexible and varied security solutions

    1. Photo of Mo Cashman

      Mo Cashman

      enterprise security architect and principal engineer, McAfee

  2. Security and Compliance Risks Associated With the Merger and Acquisition Process

    Mergers and acquisitions provide new processes and technologies that can mitigate risks

    1. Photo of Verity Chinnery

      Verity Chinnery

      Senior Director of GRC Implementations, SureCloud

  3. The 5 Golden Rules of Cyber-War

    Cyberspace is now the 5th domain of warfare recognized by NATO alongside land, air, sea and space

    1. Photo of Erwan Keraudy

      Erwan Keraudy

      CEO, CybelAngel

  4. Modern Challenges in Securing Multi-Cloud Environments

    Why cloud security best practices will continue to evolve as organizations better understand the environment

    1. Photo of Tim Erlin

      Tim Erlin

      VP of Product Management and Strategy, Tripwire

  5. Data Protection When Cyber-Attacks Are Rife

    How organizations and employees can stay one step ahead of the rapidly evolving threats

    1. Photo of Patrick Harr

      Patrick Harr

      CEO, SlashNext

  6. The Privilege Is Mine: Protecting Endpoints From Compromised Credentials

    Why staying on top of endpoints will strengthen security defenses and keep sensitive data safe

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  7. 3 Key Reasons Zero Trust Network Access is Critical for Today's Mobile Worker

    Networks have to be secure, but that security shouldn’t prevent innovation and forward movement in business

    1. Photo of Aaron Kiemele

      Aaron Kiemele

      Chief Information Security Officer, Jamf

  8. Phishing Is an Insider Risk - It's Time to Tackle It Like One

    Employees are your last line of defense from phishing – empower them, and you can turn them into your biggest strength

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

  9. What Happens When You Give Excessive Access Rights to Employees

    Strengthening your security with authentication and monitoring will keep your company’s data secure

    1. Photo of Alexey Kessenikh

      Alexey Kessenikh

      CISO, Soveren

  10. #HowTo: Protect Against Remote Code Execution Attacks

    Organizations must understand how their software runs and have the capability to stop any digression in milliseconds

    1. Photo of Satya Gupta

      Satya Gupta

      co-founder and chief technology officer, Virsec

  11. Haugen Testimony Shows Cybersecurity Researchers Must Also Consider Mental Health

    Cybersecurity researchers have the potential to improve the lives of tens of millions of people

    1. Photo of Corye Douglas

      Corye Douglas

      National Guardsman for New York State.

    2. Photo of Austen D. Givens,

      Austen D. Givens,

      Professor at Utica College

    3. Photo of Nikki S. Sanders

      Nikki S. Sanders

      Utica College alumna

  12. The Three OT Security Dangers of R&R

    Why upfront thought, strategic planning and a bit of patience will go a long way

    1. Photo of Daniel Trivellato

      Daniel Trivellato

      TitleVice President, Product & Engineering (OT, IoT, IoMT), Forescout

  13. 4 Reasons Why Companies Fail to Fix Cloud Misconfigurations

    Lack of cloud security knowledge, team alignment, visibility and speed explain why companies suffer misconfiguration breaches

    1. Photo of Nikhil Girdhar

      Nikhil Girdhar

      Head of Product Marketing, VMware

  14. Least Privilege Regaining Popularity

    Why zero trust provides added scalability required to secure modern multi-cloud environments

    1. Photo of Nathan Howe

      Nathan Howe

      Vice president of emerging technologies, Zscaler

  15. Digesting the Alphabet Soup - Can EDR and MDR Co-exist?

    How teams can best leverage a portfolio of detection and response strategies

    1. Photo of Josh Davies

      Josh Davies

      Product Manager, Alert Logic

  16. #HowTo: Implement a Strong Cybersecurity Program for Small Businesses

    How can small businesses develop cost-effective security programs

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  17. A Recipe for Destruction: Municipalities and Managing Cyber Risk

    From Baltimore to Birmingham, Paris to Portland, municipalities are under attack

    1. Photo of Yehudah Sunshine

      Yehudah Sunshine

      Head of PR at Odix

  18. Implementing Zero Trust Principles in a Connected World

    Foundational controls and measures determine if zero trust achieves security goals

    1. Photo of James Wilde

      James Wilde

      Global Head of Security Strategy, Sphere

  19. The Journey to Zero Trust Begins with Identity

    Identity is the fabric that ties the zero trust framework together

    1. Photo of Zain Malik

      Zain Malik

      Senior Product Marketing Manager, Ping Identity

  20. The Hard Truth About Network Security

    Failing to secure identities and data in the public cloud will jeopardize an enterprise

    1. Photo of Eric Kedrosky

      Eric Kedrosky

      CISO, Sonrai Security

What’s hot on Infosecurity Magazine?