Infosecurity Opinions

  1. Why SIEM is Not a Silver Bullet for Threat Detection and Response

    Is SIEM really essential for threat detection and response?

    1. Photo of Dave Mareels

      Dave Mareels

      CEO & founder, SOC.OS

  2. Navigating the New Security Threats to Business Travel after COVID-19

    Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them

    1. Photo of Paul Mansfield

      Paul Mansfield

      lead cyber threat intelligence analyst, Accenture

  3. #HowTo: Strengthen Supply Chain Security

    Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations

    1. Photo of Jonathan Dambrot

      Jonathan Dambrot

      principal, KPMG

    2. Photo of Ed Jennings

      Ed Jennings

      CEO, Quickbase

  4. Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question

    Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum

    1. Photo of Justin Fier

      Justin Fier

      Director for Cyber Intelligence & Analytics, Darktrace

  5. Can You Identify and Defend Your Organization's Crown Jewels?

    You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

    1. Photo of Uri Levy

      Uri Levy

      SVP global strategy, XM Cyber

  6. Slow and Steady Wins the Race to the Cloud

    Rushing through cloud migration will leave organizations more vulnerable to security breaches

    1. Photo of Randy Shore

      Randy Shore

      VP of delivery and support, Cloudtamer.io

  7. Charting a Path Out of an Epidemic of Hidden Breaches

    The cyber industry needs to get better at detecting and preventing hidden breaches

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  8. Considerations When Sharing Information with an AG's Office

    What are the risks associated with producing info to a state AG?

    1. Photo of Mira Baylson

      Mira Baylson

      partner, state attorneys general group, Cozen O'Connor

    2. Photo of Lori Kalani

      Lori Kalani

      co-chair of the State Attorneys General Group, Cozen O'Connor

    3. Photo of Meghan Stoppel

      Meghan Stoppel

      partner, state attorneys general group, Cozen O'Connor

  9. Why Businesses Must Diversify Their Tech

    In light of the widespread website outage last months, should organizations look to diversify their tech providers?

    1. Photo of Jake Madders

      Jake Madders

      co-founder and director, Hyve Managed Hosting

  10. #HowTo: Approach Budgeting as a CISO

    CISOs need to assess how security can contribute to business objectives to manage their budgets

    1. Photo of Giuseppe Brizio

      Giuseppe Brizio

      CISO EMEA, Qualys

  11. The Countdown Towards Zero Trust and MFA

    What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

    1. Photo of Dr Bobby Blumofe

      Dr Bobby Blumofe

      chief technology officer, Akamai

  12. The Evolution of Ransomware and How to Move Forward

    Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iboss

  13. Staying On Guard Against Cyber-Attacks

    Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  14. Understanding and Mitigating Cyber Risk in the Healthcare System

    Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

    1. Photo of Ronen Lago

      Ronen Lago

      CTO and co-founder, CYE

  15. #HowTo: Be More Resilient Against Ransomware

    Organizations need to start designing their disaster recovery plans with ransomware in mind

    1. Photo of Robert Capps

      Robert Capps

      VP of emerging technologies, NuData Security

  16. Malware-as-a-Service is a Booming Business

    Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

    1. Photo of Ron Davidson

      Ron Davidson

      VP R&D and CTO, Skybox Security

  17. The Power of Anonymity in Supply Chain Security

    The rise in supply chain attacks should serve as a warning to organizations to update their email security

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  18. Going Passwordless: What Are the Benefits For Your Business?

    Given the number of breaches associated with stolen credentials, should orgs go passwordless?

    1. Photo of Steve Whiter

      Steve Whiter

      director, Appurity

  19. How DNS Security Can Help Combat the IoT Challenge

    Domain name system (DNS) can help IT teams protect their network against shadow IT threats

    1. Photo of Keith Glancey

      Keith Glancey

      systems engineering manager, Infoblox

  20. Three Key Elements of a Defense-in-Depth Approach to Phishing

    What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

What’s hot on Infosecurity Magazine?