Infosecurity Opinions

  1. Can Organizations Ever Reach a State of Zero Trust?

    Zero trust is not a security solution - it's a state of mind

    1. Photo of Dr Zulfikar Ramzan

      Dr Zulfikar Ramzan

      chief digital officer, RSA Security

  2. #HowTo: Identify and Appoint the Right Security Partner for Your Organization

    What considerations should orgs make when deciding whether to work with a security partner?

    1. Photo of Brad Taylor

      Brad Taylor

      CEO and co-founder, Proficio

  3. US Supreme Court Rules on Key Software Development Practice

    What are the ramifications of the recent supreme court ruling in the Google v Oracle case?

    1. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  4. #WorldPasswordDay 2021: Why Waving Goodbye to Passwords is Still the Best Password We Can Use This Year

    Has the time come to say goodbye to passwords?

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  5. The 2021 Cloud Native Landscape

    Security pros must remain aware of new trends in the cloud native environment

    1. Photo of Benjy Portnoy

      Benjy Portnoy

      senior director of solution architecture, Aqua Security

  6. Testing Cyber-defenses: Does the ‘New Normal’ Mean We Need to Up the Stakes?

    Do orgs need to ramp up cybersecurity testing practices in the post-COVID world?

    1. Photo of Vladimir Zapolyansky

      Vladimir Zapolyansky

      CMO, Positive Technologies

  7. Businesses Must Secure Their Devices Now to Safely Embrace Arrival of Hybrid Working

    Businesses must adapt their security structure to enable a hybrid model of work

    1. Photo of Joe Walsh

      Joe Walsh

      director of B2B, Samsung Electronics

  8. #HowTo: Leverage Existing ICS Security Investments to Effectively Reduce Cyber Risk

    When your cybersecurity budget is slim and your team petite, how can you implement the required level of cybersecurity?

    1. Photo of Ron Brash

      Ron Brash

      director of cyber security insights, Verve Industrial

  9. Three Questions to Consider to Help Mitigate Against Supply Chain Attacks

    How should orgs assess current approaches to mitigate against supply chain attacks?

    1. Photo of John Faber

      John Faber

      Senior Consultant, Booz Allen Hamilton

  10. Taxed and Hacked: How Your Company Could Be at Risk This Tax Season

    What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  11. Outlier Detection Techniques for Fraud

    Data science techniques can help detect credit card fraud

    1. Photo of Rosaria Silipo

      Rosaria Silipo

      principal data scientist, KNIME

    2. Photo of Maarit Widmann

      Maarit Widmann

      junior data scientist, KNIME

  12. What if we Gave Users Control of Their Own Digital Identity?

    How can users be put back in control of their digital identities?

    1. Photo of Armin Ebrahimi

      Armin Ebrahimi

      Head of Distributed Identity, Ping Identity

  13. Personal Security IS Enterprise Security

    Helping employees stay safe in their personal lives will translate into work

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  14. #HowTo: Protect Your Employees from Data Loss

    How should orgs tackle insider risk amid the shift to remote working?

    1. Photo of Tony Pepper

      Tony Pepper

      CEO, Egress

  15. How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This

    SMEs need to take a new approach to protecting themselves from cyber-attacks

    1. Photo of Liron Barak

      Liron Barak

      CEO and Co-Founder of BitDam

  16. CSP & Magecart Web Skimmers: Facts and Fiction

    It is important for e-commerce providers to fully understand the evolution of Magecart attacks

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  17. How Secure Are Healthcare IT Systems? New Research Provides a Glimpse

    How can healthcare orgs make themselves more secure amid rising attacks?

    1. Photo of Ed Bellis

      Ed Bellis

      Co-founder and CTO, Kenna Security

  18. The Case For and Against Criminalizing Ransomware

    What are the main issues surrounding ransomware payments?

    1. Photo of Stuart Reed

      Stuart Reed

      UK Director, Orange Cyberdefense

  19. Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots

    Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process

    1. Photo of Jason Kent

      Jason Kent

      Hacker In Residence, Cequence Security

  20. HowTo: Improve Your Security Team’s Remediation Efficiency

    What are the key steps to developing a risk-based vulnerability management strategy?

    1. Photo of Simon Roe

      Simon Roe

      Application Security Product Manager, Outpost24

What’s hot on Infosecurity Magazine?