Infosecurity Opinions

  1. #HowTo: Protect Medical Institutions from Cyber-Attacks

    Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

    1. Photo of Shimrit Tzur-David

      Shimrit Tzur-David

      CTO of Secret Double Octopus

  2. How Ransomware is Teaming Up with DDoS

    Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  3. Data Sovereignty and Privacy Compliance Post Schrems II

    How can organizations remain compliant following the Schrems II decision last year?

    1. Photo of Rob Stubbs

      Rob Stubbs

      product director, Fortanix

  4. Why Enterprise Users Can't Wait for Patch Updates

    Are software patches often little more than a glorified form of Whack-A-Mole?

    1. Photo of Eric Helmer

      Eric Helmer

      chief technology officer, Rimini Street

  5. How Has the Education Sector Adapted to Life in the Cloud?

    Education institutions have faced particular challenges with cloud adoption during COVID-19

    1. Photo of Kieran Nalton

      Kieran Nalton

      senior security consultant, SureCloud

  6. Signs, Causes and Solutions for Network Data Breaches

    What are the common signs and solutions for dealing with network breaches?

    1. Photo of Ali Neil

      Ali Neil

      director of international security solutions, Verizon Media

  7. #HowTo: Ensure Third Parties Don't Compromise Your Supply Chain

    More disciplined attention is required to make sure third party vendors don't compromise your supply chain

    1. Photo of Gyan Prakash

      Gyan Prakash

      head of information security, Altimetrik

  8. Protecting CNI: It’s About the Collective

    Nominet argues that protecting CNI requires a collaborative approach

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  9. Disengaged Employees Could Become Your Organization's Greatest Security Threat

    Organizations must establish accountability for security to avoid the danger posed by disengaged employees

    1. Photo of Lucas Szymanowski

      Lucas Szymanowski

      director of information security and GRC, Wrike

  10. What Are GDPR's Hidden Benefits Three Years On?

    What should organizations do to ensure they meet GDPR standards on data security and privacy?

    1. Photo of Adam Bird

      Adam Bird

      CEO and co-founder, Cronofy

  11. What's New in the EU's Updated Standard Contractual Clauses?

    Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Bridget Treacy

      Bridget Treacy

      partner, Hunton Andrews Kurth LLP

  12. Is the "Cyber Skills Shortage" a Misnomer?

    If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage

    1. Photo of Dr Leila Powell

      Dr Leila Powell

      lead data scientist, Panaseer

  13. #HowTo: Approach Identity Management

    To support identity effectively, we have to implement processes that use standards and embrace technologies

    1. Photo of Greg Keller

      Greg Keller

      CTO, JumpCloud

  14. Fileless Attacks: Addressing Evolving Malware Threats

    Organizations must consider fileless malware threats as well as traditional approaches

    1. Photo of Eric Barnes

      Eric Barnes

      cyber services architect, Integrity360

  15. What We Can Learn from Recent High Profile Cyber Attacks?

    What actions should organisations take to improve their security amid rising and more sophisticated threats?

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  16. Proactive Security Key to Combatting Supply Chain Attacks

    What lessons can be learned from the recent Air India data breach?

    1. Photo of Robert Fitzsimons

      Robert Fitzsimons

      product manager, Telesoft Technologies

  17. How Innovation Powered by Privacy Can Eliminate Data Waste

    Organizations need to embrace a privacy mindset to use data successfully

    1. Photo of Michael Ingrassia

      Michael Ingrassia

      president and general counsel, Truata

  18. What Will Enterprise Security Look Like After COVID-19?

    Orgs need to focus on securing the digital shift during COVID-19

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  19. #HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment

    How can orgs get the most from cloud-native environments and agile delivery?

    1. Photo of Andreas Lehofer

      Andreas Lehofer

      chief product officer, Dynatrace

  20. Biden’s Executive Order: The Inclusivity Imperative

    The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order

    1. Photo of Michael Oldham

      Michael Oldham

      CEO, PortSys

What’s hot on Infosecurity Magazine?