Infosecurity Opinions

  1. Better Accountability and Security Needed to Improve Government Aid

    Improved accountability, security and identity verification is essential to get the most out of government aid programs

    1. Photo of Jonathan McDonald

      Jonathan McDonald

      executive vice president, U.S. public sector, TransUnion

  2. Aiming at a Moving Target: The Future of Security Teams in a Dynamic Environment

    How allies can support security teams in fast-changing environments

    1. Photo of Chris Rothe

      Chris Rothe

      Co-Founder of Red Canary

  3. A Presidential Wakeup on Cybersecurity

    What should the private sector take from President Biden's most recent executive order on cybersecurity?

    1. Photo of Craig Sanderson

      Craig Sanderson

      vp of product management, Infoblox

  4. Paying a Ransom is Not an Option - So What Should Be Done Instead?

    Organizations should implement measures to prevent as many ransomware infections as possible

    1. Photo of Ilia Sotnikov

      Ilia Sotnikov

      security strategist & VP of user experience, Netwrix

  5. Why SIEM is Not a Silver Bullet for Threat Detection and Response

    Is SIEM really essential for threat detection and response?

    1. Photo of Dave Mareels

      Dave Mareels

      CEO & founder, SOC.OS

  6. Navigating the New Security Threats to Business Travel after COVID-19

    Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them

    1. Photo of Paul Mansfield

      Paul Mansfield

      lead cyber threat intelligence analyst, Accenture

  7. #HowTo: Strengthen Supply Chain Security

    Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations

    1. Photo of Jonathan Dambrot

      Jonathan Dambrot

      principal, KPMG

    2. Photo of Ed Jennings

      Ed Jennings

      CEO, Quickbase

  8. Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question

    Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum

    1. Photo of Justin Fier

      Justin Fier

      Director for Cyber Intelligence & Analytics, Darktrace

  9. Can You Identify and Defend Your Organization's Crown Jewels?

    You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

    1. Photo of Uri Levy

      Uri Levy

      SVP global strategy, XM Cyber

  10. Slow and Steady Wins the Race to the Cloud

    Rushing through cloud migration will leave organizations more vulnerable to security breaches

    1. Photo of Randy Shore

      Randy Shore

      VP of delivery and support, Cloudtamer.io

  11. Charting a Path Out of an Epidemic of Hidden Breaches

    The cyber industry needs to get better at detecting and preventing hidden breaches

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  12. Considerations When Sharing Information with an AG's Office

    What are the risks associated with producing info to a state AG?

    1. Photo of Mira Baylson

      Mira Baylson

      partner, state attorneys general group, Cozen O'Connor

    2. Photo of Lori Kalani

      Lori Kalani

      co-chair of the State Attorneys General Group, Cozen O'Connor

    3. Photo of Meghan Stoppel

      Meghan Stoppel

      partner, state attorneys general group, Cozen O'Connor

  13. Why Businesses Must Diversify Their Tech

    In light of the widespread website outage last months, should organizations look to diversify their tech providers?

    1. Photo of Jake Madders

      Jake Madders

      co-founder and director, Hyve Managed Hosting

  14. #HowTo: Approach Budgeting as a CISO

    CISOs need to assess how security can contribute to business objectives to manage their budgets

    1. Photo of Giuseppe Brizio

      Giuseppe Brizio

      CISO EMEA, Qualys

  15. The Countdown Towards Zero Trust and MFA

    What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

    1. Photo of Dr Bobby Blumofe

      Dr Bobby Blumofe

      chief technology officer, Akamai

  16. The Evolution of Ransomware and How to Move Forward

    Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iBoss

  17. Staying On Guard Against Cyber-Attacks

    Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  18. Understanding and Mitigating Cyber Risk in the Healthcare System

    Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

    1. Photo of Ronen Lago

      Ronen Lago

      CTO and co-founder, CYE

  19. #HowTo: Be More Resilient Against Ransomware

    Organizations need to start designing their disaster recovery plans with ransomware in mind

    1. Photo of Robert Capps

      Robert Capps

      VP of emerging technologies, NuData Security

  20. Malware-as-a-Service is a Booming Business

    Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

    1. Photo of Ron Davidson

      Ron Davidson

      VP R&D and CTO, Skybox Security

What’s hot on Infosecurity Magazine?