Infosecurity Opinions

  1. #HowTo: Avoid Credential Abuse

    Cloud-based MFA can enhance organizations' security

    1. Photo of Alexandre Cagnoni

      Alexandre Cagnoni

      director of authentication, WatchGuard Technologies

  2. Developers and Security - Using Data to Consolidate and Collaborate

    Looking at data in context can help teams improve their results, consolidate their tooling and collaborate more effectively

    1. Photo of Colin Fernandes

      Colin Fernandes

      EMEA Product Director, Sumo Logic

  3. Latest OMB Memo Doubles Down on Flawed NIST Critical Software Standards

    The administration must re-examine NIST’s new standards and seize the opportunity to make a real difference

    1. Photo of Jeff Williams

      Jeff Williams

      CTO, Contrast Security

  4. In this Perpetual Distributed Workplace, How Do We Trust Each Other?

    The inability to trust becomes a cyclical challenge that could stifle employee productivity and corporate innovation for years

    1. Photo of Neil Costigan

      Neil Costigan

      CEO, BehavioSec

  5. Why the M&A Boom of 2021 Could Be a Data Security Bust

    Addressing data dangers as soon as possible should be a fundamental part of the M&A process

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  6. What California, Colorado and Virginia Teach Us About the Future of US Privacy Law

    Key trends that will influence other states

    1. Photo of Ali Jessani

      Ali Jessani

      Associate, WilmerHale

  7. Protecting Critical Infrastructure in the Digital Battlefield

    Security and safety must be inherent and assured characteristics for all intelligent systems throughout their lifecycle

    1. Photo of Roberto  Valla

      Roberto Valla

      Field Digital Transformation Officer (DTO), Wind River

  8. #HowTo: Defend Against Rising Application Layer Attacks

    Advances in applications have introduced a number of new often overlooked, security vulnerabilities

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  9. Make Employees Part of the Security Solution

    Organizations should build employee training within overall security solutions

    1. Photo of Lior Kohavi

      Lior Kohavi

      Chief Strategy Officer and EVP for Advanced Solutions, Cyren

  10. Reducing Cookie Walls and Banners Post-Brexit: There Must Be a Better Way

    Are proposed legislative changes in regard to cookies really necessary?

    1. Photo of Richard Hancock

      Richard Hancock

      data protection officer, GlobalSign

  11. How Ground-Breaking is WhatsApp's Fine?

    Every privacy policy needs careful thought and reflects the company’s actual data processing

    1. Photo of Alexander  Egerton

      Alexander Egerton

      Partner and privacy compliance officer at Seddons

  12. How To Improve Patch Management

    Why it's vital to creat a patching cycle that continuously updates your inventory, manages priorities and delivers updates

    1. Photo of Paul Baird

      Paul Baird

      Chief technical security officer, Qualys

  13. Hospital Security Teams: Are the Odds Stacked Against Them?

    Hospital executives need to invest the resources necessary to ensure the safety of their patients

    1. Photo of Azi Cohen

      Azi Cohen

      CEO, CyberMDX

  14. Cybersecurity 2021: Where Are We Moving Into Q4?

    Why strong digital countermeasures, application allow-listing and endpoint encryption are gaining traction

    1. Photo of Jerry Ray

      Jerry Ray

      COO, SecureAge

  15. Race Against Time: Why a Robust Application Security Posture is Essential

    Application and security teams need to improve their synergy to protect organizations from data breaches

    1. Photo of Gregg Ostrowski

      Gregg Ostrowski

      Regional CTO, Cisco AppDynamics

  16. #HowTo: Make You and Your Departments More Digitally Secure

    Organizations only need to do the simplest things to protect their data

    1. Photo of Sam Johnstone

      Sam Johnstone

      CMO, BookingLive

  17. Ransomware is Harming Cybersecurity Strategy: What Can Organizations Do?

    Smarter use of technology can protect organizations from ransomware attacks

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  18. Why Are Industrial Control System Attacks Increasing?

    The answer lies in the convergence of OT and IT, exposing industrial environments with outdated technologies to the internet

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  19. President Biden Has Opened the Door to Zero Trust - Will Boris Johnson Follow Suit?

    Is it time for the UK government to endorse zero trust?

    1. Photo of Tony Scott

      Tony Scott

      former federal CIO for the Obama Administration; board member, ColorTokens

  20. Avoiding the Achilles Heel of Non-European Cybersecurity

    Should organizations choose a local provider in regard to their data security?

    1. Photo of John Vestberg

      John Vestberg

      CEO, Clavister

What’s Hot on Infosecurity Magazine?