Infosecurity Opinions

  1. #HowTo: Steer Clear of a Ransomware Attack

    Following a surge in ransomware incidents, organizations must be prepared to fend off this type of attack

    1. Photo of Jerry Nguyen

      Jerry Nguyen

      director of threat intelligence and rapid response, Nuspire

  2. The Future of Cybersecurity is User Experience

    Cybersecurity products will need to marry functionality with ease of use

    1. Photo of Kim Mirazimi

      Kim Mirazimi

      vice president for the technology portfolio, 3Pillar Global

  3. Maintaining Secure and Resilient Clouds in Turbulent Times

    There has never been a more critical time for organizations to ensure the efficiency and stability of their cloud-based IT

    1. Photo of Chris Bairstow

      Chris Bairstow

      director of EMEA sales, Virtustream

  4. Why is Ransomware Still So Successful?

    How can we eliminate the scourge of ransomware once and for all?

    1. Photo of Nicolas Casimir

      Nicolas Casimir

      CISO, EMEA, Zscaler

  5. Online Harms - Damned if They Do, Damned if They Don’t?

    Will the UK's proposed online harms legislation end up satisfying no one?

    1. Photo of Greta Barkle

      Greta Barkle

      associate, BCL Solicitors

    2. Photo of Guevara Leacock

      Guevara Leacock

      legal assistant, BCL Solicitors

  6. Armoring the VDI to Protect Business Critical Applications and Data

    VDI platforms provide secure remote access for enterprises, but they are not foolproof if the devices used to access them are unmanaged

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  7. #HowTo: Secure Your Business with Smart Spending

    Organizations should take a more strategic approach to security spending in the current threat landscape

    1. Photo of Adam Philpott

      Adam Philpott

      EMEA President, McAfee

  8. Ransomware: Survive by Outrunning the Guy Next to You

    How can orgs avoid incidents like the recent ransomware attack on a US pipeline?

    1. Photo of Allie Mellen

      Allie Mellen

      analyst, Forrester

  9. Governments and Organizations Can’t Ignore Threats Posed by Disinformation

    How can governments and businesses combat the scourge of disinformation online?

    1. Photo of Stuart Taylor

      Stuart Taylor

      senior director, Forcepoint

  10. Top Five Challenges of Building an Identity Governance Strategy

    How can orgs build an effective identity governance strategy?

    1. Photo of Jackson Shaw

      Jackson Shaw

      chief strategy officer, Clear Skye

  11. Avoid Being a Headline: Not all Domain Registrars are Created Equal

    Amid third-party security threats, brands need to look carefully at their domain registrars

    1. Photo of Vincent D'Angelo

      Vincent D'Angelo

      global director, strategic alliances, Digital Brand Services Division, CSC

  12. Can Organizations Ever Reach a State of Zero Trust?

    Zero trust is not a security solution - it's a state of mind

    1. Photo of Dr Zulfikar Ramzan

      Dr Zulfikar Ramzan

      chief digital officer, RSA Security

  13. #HowTo: Identify and Appoint the Right Security Partner for Your Organization

    What considerations should orgs make when deciding whether to work with a security partner?

    1. Photo of Brad Taylor

      Brad Taylor

      CEO and co-founder, Proficio

  14. US Supreme Court Rules on Key Software Development Practice

    What are the ramifications of the recent supreme court ruling in the Google v Oracle case?

    1. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  15. #WorldPasswordDay 2021: Why Waving Goodbye to Passwords is Still the Best Password We Can Use This Year

    Has the time come to say goodbye to passwords?

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  16. The 2021 Cloud Native Landscape

    Security pros must remain aware of new trends in the cloud native environment

    1. Photo of Benjy Portnoy

      Benjy Portnoy

      senior director of solution architecture, Aqua Security

  17. Testing Cyber-defenses: Does the ‘New Normal’ Mean We Need to Up the Stakes?

    Do orgs need to ramp up cybersecurity testing practices in the post-COVID world?

    1. Photo of Vladimir Zapolyansky

      Vladimir Zapolyansky

      CMO, Positive Technologies

  18. Businesses Must Secure Their Devices Now to Safely Embrace Arrival of Hybrid Working

    Businesses must adapt their security structure to enable a hybrid model of work

    1. Photo of Joe Walsh

      Joe Walsh

      director of B2B, Samsung Electronics

  19. #HowTo: Leverage Existing ICS Security Investments to Effectively Reduce Cyber Risk

    When your cybersecurity budget is slim and your team petite, how can you implement the required level of cybersecurity?

    1. Photo of Ron Brash

      Ron Brash

      director of cyber security insights, Verve Industrial

  20. Three Questions to Consider to Help Mitigate Against Supply Chain Attacks

    How should orgs assess current approaches to mitigate against supply chain attacks?

    1. Photo of John Faber

      John Faber

      Senior Consultant, Booz Allen Hamilton

What’s hot on Infosecurity Magazine?