Infosecurity Opinions

  1. Rethinking Security When Identity is the Ultimate Attack Surface

    The pandemic-induced accelerated digital transformation has seen new hybrid working models disrupting how identities are managed

    1. Photo of Craig Ramsay

      Craig Ramsay

      presales consultant, Omada

  2. Make or Break: What To Do When Security Solutions Fail

    Why a strong business continuity strategy built around the concept of zero trust is essential

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  3. UK's General Data Protection Regulation (GDPR) Explained

    Why there's a duty to protect the personal data of companies like Total Fitness under the UK's iteration of GDPR

    1. Photo of Jack Dunn

      Jack Dunn

      Associate, Bryan Cave Leighton Paisner

    2. Photo of Geraldine Scali

      Geraldine Scali

      Partner, Bryan Cave Leighton Paisner

  4. GSaaS: The Changing Dynamics of Cybersecurity

    GSaaS will shape the future of organizations' data security

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  5. Why AI and Automation Provide Superhuman Security

    While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

  6. Cloud Misconfigurations: The Hidden but Preventable Threat to Cloud Data

    Misconfigured cloud environments is an increasing security issue for businesses

    1. Photo of Assaf Morag

      Assaf Morag

      lead data analyst, Aqua Security

  7. Securing a Hybrid Work Environment: The Worst of Both Worlds

    The new threat landscape and how organizations can prepare and protect themselves

    1. Photo of Randy Watkins

      Randy Watkins

      Chief Technology Officer, Critical Start

  8. The Three Pillars of Unified Risk Management for Product Security

    In today's threat landscape, security requires a holistic approach involving both software and hardware aspects

    1. Photo of Altaz Valani

      Altaz Valani

      director, insights research, Security Compass

  9. #HowTo: Defend Against Increasingly Convincing Phishing Attacks

    Cyber-criminals have refined their phishing techniques during the pandemic, and organizations must improve their defenses

    1. Photo of Alex Holland

      Alex Holland

      senior malware analyst, HP

  10. Prioritize the Fraud Epidemic Arising from the Pandemic

    Finding the root cause of fraud involves undertaking offensive counter-fraud

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  11. Combating Cyber-Threats in the Age of Big Tech

    Why big tech must work hard at IT security, using their own in-house expertise and benefiting from third-party security experts

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  12. Why the Pegasus Mobile Spyware Incident is a Wake-Up Call

    The Pegasus spyware incident shows it's vital to collaborate in the technology sector to enhance security and privacy

    1. Photo of Burak Agca

      Burak Agca

      security engineer, Lookout Inc

  13. Why Apple's iCloud+ Provides a Future Unlocking for Authoritarian Government Data Surveillance

    Why the future belongs to organizations that don’t see a dichotomy between regulation and advancement

    1. Photo of Tunio Zafer

      Tunio Zafer

      CEO at pCloud

  14. Embedded Fraud Analytics for DeFi Protocols

    Fraud analytics systems are needed to help build secure DeFi ecosystems

    1. Photo of Debanjan Chatterjee

      Debanjan Chatterjee

      Fraud Analytics professional

  15. Security Best Practices for Hybrid Work Environments

    With hybrid working becoming the norm in many organizations, IT teams must get ahead to optimize security

    1. Photo of Chris Conry

      Chris Conry

      CIO, Fuze

  16. Challenges and Future Trends in Cryptography

    What cryptography innovations to better secure data and improve infrastructures can we look forward to?

    1. Photo of Ryan Smith

      Ryan Smith

      vice president, global business development, Futurex

  17. #HowTo: Stay Secure When Deploying Robotic Process Automation

    With robotic process automation becoming increasingly popular, what security measures are required?

    1. Photo of Cathy Tornbohm

      Cathy Tornbohm

      distinguished VP research analyst, Gartner

  18. When Cyber-Attacks Lead to Disasters, Does the Stafford Act Apply?

    As critical infrastructure becomes more vulnerable to disastrous cyber-attacks, the US must seek novel solutions to keep its citizens safe

    1. Photo of Matt Lyttle

      Matt Lyttle

      associate director, National Security, Guidehouse

    2. Photo of Yvonne Manzo

      Yvonne Manzo

      cyber policy and planning, National Security, Guidehouse

  19. Business Leaders Need to Quantify Their Cyber Risk

    Consistent CRQ practice is key to quantifying cyber risk, enabling better business decisions to be made

    1. Photo of Sean McDermott

      Sean McDermott

      CEO, RedMonocle

  20. Identity Security Can Reshape Enterprise IT Post-Pandemic

    Are identity-focused security measures necessary to support new ways of working?

    1. Photo of Emma Maslen

      Emma Maslen

      VP and GM, EMEA & APAC, Ping Identity

What’s hot on Infosecurity Magazine?