Infosecurity Opinions

  1. Why EU Data Laws Remain Important to UK Businesses Post-Brexit

    It is critical UK businesses stay up to date with changes to EU and UK data regulations

    1. Photo of Susana Figueredo

      Susana Figueredo

      senior legal and compliance executive, Incubeta

  2. An Evolving Cyber Threat: Ransomware-as-a-Service

    RaaS has lowered the barrier to entry to launch ransomware attacks, making this vector a much greater threat to organizations

    1. Photo of Chris Pogue

      Chris Pogue

      head of strategic alliances, Nuix

  3. #HowTo: Accelerate the Enterprise Journey to Passwordless

    How can organizations design a phased strategy to passwordless authentication?

    1. Photo of Wolfgang  Goerlich

      Wolfgang Goerlich

      Advisory CISO, Duo Security

  4. Why It's Time for Software Development to Wake Up

    There's too much at stake to allow software development security languish any longer

    1. Photo of Daniel Spicer

      Daniel Spicer

      VP of security, Ivanti

  5. Empowering People to Make Meaningful Change to Security Behaviors

    Rather than seeing people as the source of security problems, people need to be part of the solution

    1. Photo of Anete Poriete

      Anete Poriete

      Researcher

  6. Yes...We Need More Women in Cybersecurity, But How?

    Equal outcomes for women today create the possibility for equal opportunities for women tomorrow.

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  7. Cybersecurity Tips for Back to School Season 2021

    How can students, parents and teachers stay safe from cyber-threats as we approach back to school season?

    1. Photo of Jen Miller-Osborn

      Jen Miller-Osborn

      Deputy Director, Threat Intelligence, Unit 42, Palo Alto Networks

  8. The Cyber War on our Critical Infrastructure and How to Win

    Companies in the critical infrastructure sector must do more to protect themselves from the growing threat of cyber-attacks

    1. Photo of Ara Aslanian

      Ara Aslanian

      CEO, Inverselogic

  9. The Importance of Being Cyber Resilient

    True cyber resilience requires an ongoing business effort

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  10. Will AI/ML Solve the Cybersecurity Skills Gap?

    Much more needs to be done to realize the full potential of AI and ML in the cybersecurity sector

    1. Photo of Angelica Grillo

      Angelica Grillo

      associate consultant, Crossword Cybersecurity

  11. #HowTo: Enhance Your Phishing Training

    As phishing campaigns become more sophisticated, user awareness training must keep up

    1. Photo of Nick Emanuel

      Nick Emanuel

      senior director of product, Webroot

  12. Office 365 Remains a Target for Cyber-criminals

    With Office 365 an integral part of many organizations' operations, it has become a major target for cyber-criminals

    1. Photo of Tim Wade

      Tim Wade

      office of CTO technical director, Vectra

  13. How Organizations Can Fight Back Against Ransomware

    How do organizations upgrade their traditional systems to combat the surge in ransomware?

    1. Photo of Pritesh Parekh

      Pritesh Parekh

      chief trust & security officer, VP of engineering, Delphix

  14. Developing Gold Medal-Worthy Protection Against Video Pirates

    Developing a zero trust policy is key to an effective anti-piracy strategy

    1. Photo of Ian Munford

      Ian Munford

      director of industry strategy, Akamai

  15. Adapting Data Security for a Permanent Hybrid Working Environment

    The world has permanently changed, and organizations must adapt their security policy to match

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  16. Do Open-Source Supply Chains Leave Security Gaps in Your Organization?

    If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi

  17. Why Ransomware Protection Should Start with User Awareness

    Humans are normally easier to hack than networks, so this is where defensive efforts should be focused

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  18. #HowTo: Improve Ransomware Resilience Across Remote Working Environments

    There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  19. Data Security in the Cloud: Adapting to a New Era of Modernization

    Organizations must improve their cloud data security to avoid the risk of a substantial data breach

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  20. Better Accountability and Security Needed to Improve Government Aid

    Improved accountability, security and identity verification is essential to get the most out of government aid programs

    1. Photo of Jonathan McDonald

      Jonathan McDonald

      executive vice president, U.S. public sector, TransUnion

What’s hot on Infosecurity Magazine?