Infosecurity Opinions

  1. #HowTo: Protect Your Organization's Root Accounts

    As attacks on root account credentials continue to rise, organizations should take an active role in securing these credentials as much as possible

    1. Photo of Ray Canzanese

      Ray Canzanese

      director, Netskope Threat Labs

  2. Ensuring Visibility and Data Access Control Across Clouds

    Why businesses must adopt a delegated governance approach

    1. Photo of Balaji Ganesan

      Balaji Ganesan

      CEO and co-founder, Privacera

  3. Digitalization is Everywhere, So Why isn't Healthcare Keeping Up?

    If the healthcare industry is to continue its rapid digitalization, it must use a fit-for-purpose solution

    1. Photo of Matt Roberts

      Matt Roberts

      Healthcare Practice Lead, Juniper Networks

  4. Team Sports in Cybersecurity: Collaboration Wins Gold

    Helping organizations combat ransomware threats will give them the confidence to achieve gold-medal-worthy security

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  5. Thwarting Insider Threats, Ransomware and Protecting Water and Wastewater Facilities

    WWS facilities deserve the most sophisticated defense the market offers

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  6. What is Identity and Access Management, and Why is it so important?

    With IAM measures, organizations can prevent unauthorized access from online hackers and protect sensitive data

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  7. Simplifying Multicloud Security in a Cloud-Native World

    Five steps organizations can take to simplify multi-cloud security

    1. Photo of Gary Alterson

      Gary Alterson

      VP of Security Solutions, Rackspace

  8. Building Privacy Into AI: Is the Future Federated?

    Machine learning requires data to be stored on a centralized server, resulting in a plethora of privacy implications

    1. Photo of Aydin Ulas

      Aydin Ulas

      Data Scientist, Truata

  9. Phishing Reports Show You There's a Problem, but What's Next?

    Why investing in fun and engaging training for your team will pay dividends

    1. Photo of Drew Rose

      Drew Rose

      CSO and CO-Founder, Living Security

  10. Three Critical Cybersecurity Metrics to Fight Back

    How CISOs can fix security weaknesses to stop and mitigate attacks effectively

    1. Photo of Alastair Williams

      Alastair Williams

      Director of Solutions Engineering for EMEA at Skybox Security

  11. #HowTo: Counter Common E-commerce Threats

    As e-commerce continues to grow, online retailers are more susceptible to outside threats

    1. Photo of Sean Leach

      Sean Leach

      chief product architect, Fastly

  12. The True Cost of DDoS Attacks

    The cost of DDoS attacks is on the rise, and only an active defense will counter their potentially crippling impact

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  13. What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

    The practical uses of AI to address the skills shortage in cybersecurity

    1. Photo of Mark  Herridge

      Mark Herridge

      Chief Information Security Officer, Calligo

  14. Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks

    Training improves the cyber resilience of employees and reduces the likelihood of an organization suffering a breach

    1. Photo of Jason Stirland

      Jason Stirland

      Chief Technical Officer at DeltaNet International Limited

  15. Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce

    Follow these zero trust best practices to secure data and assets

    1. Photo of Heather Hinton

      Heather Hinton

      Chief Information Security Officer, RingCentral

  16. Analyzing the Twitch Hack and a Potential Security Hole Around IRC

    The attack seems to be the work of an individual attacker intent on disrupting the company

    1. Photo of Vince Warrington

      Vince Warrington

      CEO, Dark Intelligence

  17. Schools Prove Easy Targets For Hackers

    Schools have significant revenues, a general lack of cyber security and a low perception of information security

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  18. Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection

    With threat actors circling, there’s an urgent need to start these efforts now

    1. Photo of Craig Hattersley

      Craig Hattersley

      CTO, SOC.OS

  19. #HowTo: Avoid Credential Abuse

    Cloud-based MFA can enhance organizations' security

    1. Photo of Alexandre Cagnoni

      Alexandre Cagnoni

      director of authentication, WatchGuard Technologies

  20. Developers and Security - Using Data to Consolidate and Collaborate

    Looking at data in context can help teams improve their results, consolidate their tooling and collaborate more effectively

    1. Photo of Colin Fernandes

      Colin Fernandes

      EMEA Product Director, Sumo Logic

What’s hot on Infosecurity Magazine?