Infosecurity Opinions

  1. How Innovation Powered by Privacy Can Eliminate Data Waste

    Organizations need to embrace a privacy mindset to use data successfully

    1. Photo of Michael Ingrassia

      Michael Ingrassia

      president and general counsel, Truata

  2. What Will Enterprise Security Look Like After COVID-19?

    Orgs need to focus on securing the digital shift during COVID-19

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  3. #HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment

    How can orgs get the most from cloud-native environments and agile delivery?

    1. Photo of Andreas Lehofer

      Andreas Lehofer

      chief product officer, Dynatrace

  4. Biden’s Executive Order: The Inclusivity Imperative

    The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order

    1. Photo of Michael Oldham

      Michael Oldham

      CEO, PortSys

  5. Why it’s Time to Adopt a CISO Code of Conduct

    CISOs need to get much better at sharing insights

    1. Photo of Chris Jacquet

      Chris Jacquet

      Vice President and Chief Information Security Officer, Hitachi Vantara

  6. Cybersecurity Outsourcing: Unnecessary Cost or Clever Investment?

    What considerations should orgs have around outsourcing their security?

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  7. Three Years of GDPR: The Journey So Far and the Road Ahead

    What has been the impact of the GDPR so far, both positive and negative?

    1. Photo of Vanya Rakesh

      Vanya Rakesh

      privacy and security consultant, CRANIUM

  8. Three Years Later: Tips for Sustaining GDPR Compliance

    What do orgs need to do to adhere to GDPR standards?

    1. Photo of Dave Wagner

      Dave Wagner

      president and CEO, Zix

  9. What Does the Biden Administration’s Cybersecurity Executive Order Mean for Your Organization?

    Biden's executive order is likely to become a "north star" for security expectations

    1. Photo of Adam Isles

      Adam Isles

      principal, The Chertoff Group

    2. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  10. #HowTo: Steer Clear of a Ransomware Attack

    Following a surge in ransomware incidents, organizations must be prepared to fend off this type of attack

    1. Photo of Jerry Nguyen

      Jerry Nguyen

      director of threat intelligence and rapid response, Nuspire

  11. The Future of Cybersecurity is User Experience

    Cybersecurity products will need to marry functionality with ease of use

    1. Photo of Kim Mirazimi

      Kim Mirazimi

      vice president for the technology portfolio, 3Pillar Global

  12. Maintaining Secure and Resilient Clouds in Turbulent Times

    There has never been a more critical time for organizations to ensure the efficiency and stability of their cloud-based IT

    1. Photo of Chris Bairstow

      Chris Bairstow

      director of EMEA sales, Virtustream

  13. Why is Ransomware Still So Successful?

    How can we eliminate the scourge of ransomware once and for all?

    1. Photo of Nicolas Casimir

      Nicolas Casimir

      CISO, EMEA, Zscaler

  14. Online Harms - Damned if They Do, Damned if They Don’t?

    Will the UK's proposed online harms legislation end up satisfying no one?

    1. Photo of Greta Barkle

      Greta Barkle

      associate, BCL Solicitors

    2. Photo of Guevara Leacock

      Guevara Leacock

      legal assistant, BCL Solicitors

  15. Armoring the VDI to Protect Business Critical Applications and Data

    VDI platforms provide secure remote access for enterprises, but they are not foolproof if the devices used to access them are unmanaged

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  16. #HowTo: Secure Your Business with Smart Spending

    Organizations should take a more strategic approach to security spending in the current threat landscape

    1. Photo of Adam Philpott

      Adam Philpott

      EMEA President, McAfee

  17. Ransomware: Survive by Outrunning the Guy Next to You

    How can orgs avoid incidents like the recent ransomware attack on a US pipeline?

    1. Photo of Allie Mellen

      Allie Mellen

      analyst, Forrester

  18. Governments and Organizations Can’t Ignore Threats Posed by Disinformation

    How can governments and businesses combat the scourge of disinformation online?

    1. Photo of Stuart Taylor

      Stuart Taylor

      senior director, Forcepoint

  19. Top Five Challenges of Building an Identity Governance Strategy

    How can orgs build an effective identity governance strategy?

    1. Photo of Jackson Shaw

      Jackson Shaw

      chief strategy officer, Clear Skye

  20. Avoid Being a Headline: Not all Domain Registrars are Created Equal

    Amid third-party security threats, brands need to look carefully at their domain registrars

    1. Photo of Vincent D'Angelo

      Vincent D'Angelo

      global director, strategic alliances, Digital Brand Services Division, CSC

What’s hot on Infosecurity Magazine?