Infosecurity Opinions

  1. The Power of Anonymity in Supply Chain Security

    The rise in supply chain attacks should serve as a warning to organizations to update their email security

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  2. Going Passwordless: What Are the Benefits For Your Business?

    Given the number of breaches associated with stolen credentials, should orgs go passwordless?

    1. Photo of Steve Whiter

      Steve Whiter

      director, Appurity

  3. How DNS Security Can Help Combat the IoT Challenge

    Domain name system (DNS) can help IT teams protect their network against shadow IT threats

    1. Photo of Keith Glancey

      Keith Glancey

      systems engineering manager, Infoblox

  4. Three Key Elements of a Defense-in-Depth Approach to Phishing

    What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  5. #HowTo: Protect Medical Institutions from Cyber-Attacks

    Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

    1. Photo of Shimrit Tzur-David

      Shimrit Tzur-David

      CTO of Secret Double Octopus

  6. How Ransomware is Teaming Up with DDoS

    Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  7. Data Sovereignty and Privacy Compliance Post Schrems II

    How can organizations remain compliant following the Schrems II decision last year?

    1. Photo of Rob Stubbs

      Rob Stubbs

      product director, Fortanix

  8. Why Enterprise Users Can't Wait for Patch Updates

    Are software patches often little more than a glorified form of Whack-A-Mole?

    1. Photo of Eric Helmer

      Eric Helmer

      chief technology officer, Rimini Street

  9. How Has the Education Sector Adapted to Life in the Cloud?

    Education institutions have faced particular challenges with cloud adoption during COVID-19

    1. Photo of Kieran Nalton

      Kieran Nalton

      senior security consultant, SureCloud

  10. Signs, Causes and Solutions for Network Data Breaches

    What are the common signs and solutions for dealing with network breaches?

    1. Photo of Ali Neil

      Ali Neil

      director of international security solutions, Verizon Media

  11. #HowTo: Ensure Third Parties Don't Compromise Your Supply Chain

    More disciplined attention is required to make sure third party vendors don't compromise your supply chain

    1. Photo of Gyan Prakash

      Gyan Prakash

      head of information security, Altimetrik

  12. Protecting CNI: It’s About the Collective

    Nominet argues that protecting CNI requires a collaborative approach

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  13. Disengaged Employees Could Become Your Organization's Greatest Security Threat

    Organizations must establish accountability for security to avoid the danger posed by disengaged employees

    1. Photo of Lucas Szymanowski

      Lucas Szymanowski

      director of information security and GRC, Wrike

  14. What Are GDPR's Hidden Benefits Three Years On?

    What should organizations do to ensure they meet GDPR standards on data security and privacy?

    1. Photo of Adam Bird

      Adam Bird

      CEO and co-founder, Cronofy

  15. What's New in the EU's Updated Standard Contractual Clauses?

    Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Bridget Treacy

      Bridget Treacy

      partner, Hunton Andrews Kurth LLP

  16. Is the "Cyber Skills Shortage" a Misnomer?

    If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage

    1. Photo of Dr Leila Powell

      Dr Leila Powell

      lead data scientist, Panaseer

  17. #HowTo: Approach Identity Management

    To support identity effectively, we have to implement processes that use standards and embrace technologies

    1. Photo of Greg Keller

      Greg Keller

      CTO, JumpCloud

  18. Fileless Attacks: Addressing Evolving Malware Threats

    Organizations must consider fileless malware threats as well as traditional approaches

    1. Photo of Eric Barnes

      Eric Barnes

      cyber services architect, Integrity360

  19. What We Can Learn from Recent High Profile Cyber Attacks?

    What actions should organisations take to improve their security amid rising and more sophisticated threats?

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  20. Proactive Security Key to Combatting Supply Chain Attacks

    What lessons can be learned from the recent Air India data breach?

    1. Photo of Robert Fitzsimons

      Robert Fitzsimons

      product manager, Telesoft Technologies

What’s hot on Infosecurity Magazine?