Infosecurity Opinions

  1. Why It's Time for Software Development to Wake Up

    There's too much at stake to allow software development security languish any longer

    1. Photo of Daniel Spicer

      Daniel Spicer

      VP of security, Ivanti

  2. Empowering People to Make Meaningful Change to Security Behaviors

    Rather than seeing people as the source of security problems, people need to be part of the solution

    1. Photo of Anete Poriete

      Anete Poriete

      Researcher

  3. Yes...We Need More Women in Cybersecurity, But How?

    Equal outcomes for women today create the possibility for equal opportunities for women tomorrow.

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  4. Cybersecurity Tips for Back to School Season 2021

    How can students, parents and teachers stay safe from cyber-threats as we approach back to school season?

    1. Photo of Jen Miller-Osborn

      Jen Miller-Osborn

      Deputy Director, Threat Intelligence, Unit 42, Palo Alto Networks

  5. The Cyber War on our Critical Infrastructure and How to Win

    Companies in the critical infrastructure sector must do more to protect themselves from the growing threat of cyber-attacks

    1. Photo of Ara Aslanian

      Ara Aslanian

      CEO, Inverselogic

  6. The Importance of Being Cyber Resilient

    True cyber resilience requires an ongoing business effort

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  7. Will AI/ML Solve the Cybersecurity Skills Gap?

    Much more needs to be done to realize the full potential of AI and ML in the cybersecurity sector

    1. Photo of Angelica Grillo

      Angelica Grillo

      associate consultant, Crossword Cybersecurity

  8. #HowTo: Enhance Your Phishing Training

    As phishing campaigns become more sophisticated, user awareness training must keep up

    1. Photo of Nick Emanuel

      Nick Emanuel

      senior director of product, Webroot

  9. Office 365 Remains a Target for Cyber-criminals

    With Office 365 an integral part of many organizations' operations, it has become a major target for cyber-criminals

    1. Photo of Tim Wade

      Tim Wade

      office of CTO technical director, Vectra

  10. How Organizations Can Fight Back Against Ransomware

    How do organizations upgrade their traditional systems to combat the surge in ransomware?

    1. Photo of Pritesh Parekh

      Pritesh Parekh

      chief trust & security officer, VP of engineering, Delphix

  11. Developing Gold Medal-Worthy Protection Against Video Pirates

    Developing a zero trust policy is key to an effective anti-piracy strategy

    1. Photo of Ian Munford

      Ian Munford

      director of industry strategy, Akamai

  12. Adapting Data Security for a Permanent Hybrid Working Environment

    The world has permanently changed, and organizations must adapt their security policy to match

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  13. Do Open-Source Supply Chains Leave Security Gaps in Your Organization?

    If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi

  14. Why Ransomware Protection Should Start with User Awareness

    Humans are normally easier to hack than networks, so this is where defensive efforts should be focused

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  15. #HowTo: Improve Ransomware Resilience Across Remote Working Environments

    There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  16. Data Security in the Cloud: Adapting to a New Era of Modernization

    Organizations must improve their cloud data security to avoid the risk of a substantial data breach

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  17. Better Accountability and Security Needed to Improve Government Aid

    Improved accountability, security and identity verification is essential to get the most out of government aid programs

    1. Photo of Jonathan McDonald

      Jonathan McDonald

      executive vice president, U.S. public sector, TransUnion

  18. Aiming at a Moving Target: The Future of Security Teams in a Dynamic Environment

    How allies can support security teams in fast-changing environments

    1. Photo of Chris Rothe

      Chris Rothe

      Co-Founder of Red Canary

  19. A Presidential Wakeup on Cybersecurity

    What should the private sector take from President Biden's most recent executive order on cybersecurity?

    1. Photo of Craig Sanderson

      Craig Sanderson

      vp of product management, Infoblox

  20. Paying a Ransom is Not an Option - So What Should Be Done Instead?

    Organizations should implement measures to prevent as many ransomware infections as possible

    1. Photo of Ilia Sotnikov

      Ilia Sotnikov

      security strategist & VP of user experience, Netwrix

What’s hot on Infosecurity Magazine?