Infosecurity Opinions

  1. Promoting a Cultural Shift for Cybersecurity

    Developing a good security culture will reduce the risk of scams

    1. Photo of Tim Helming

      Tim Helming

      Director of Product Management, DomainTools

  2. #HowTo: Stop Hackers Targeting Your Home

    How can organizations defend their remote workforce from hackers?

    1. Photo of Alissa Knight

      Alissa Knight

      Group CEO at Brier & Thorn, Partner at Knight Ink and Principal Analyst

  3. It’s Time to Captivate the Next Generation of Cybersecurity Professionals

    With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses

    1. Photo of Dr Vahid Heydari

      Dr Vahid Heydari

      Cybersecurity Course Leader, Staffordshire University

  4. Firewall and Malware Challenges for Virtualized Telecom Networks

    How can service providers defend against attacks targeting virtualized telecom networks

    1. Photo of Sam Cohen

      Sam Cohen

      Cybersecurity Consultant, Deloitte

  5. Remote Working: The New Security Perimeter

    Do orgs need to rethink their security frameworks to adapt to a remote model?

    1. Photo of Colin Truran

      Colin Truran

      Senior Risk, Compliance and Governance Advisor, Quest

  6. Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder

    How have ransomware attacks evolved over the past year?

    1. Photo of Raymond Pompon

      Raymond Pompon

      Director, F5 Labs

  7. #HowTo: Implement Zero-Trust into IoT Security

    How can orgs ensure the surge in IoT devices used by employees is secure?

    1. Photo of Jason Mical

      Jason Mical

      Global Cybersecurity Evangelist, Devo

  8. Cybersecurity State Power Struggles

    Security focus must shift from stopping malicious access to protecting data itself

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  9. Transforming Security Strategies in Times of Uncertainty

    The pandemic will not be the last disruption to security planning

    1. Photo of Israel Barak

      Israel Barak

      CISO, Cybereason

  10. Communication is Crucial in the Fight Against Phishing Scams

    What communication strategies should orgs employ to mitigate against the risk of phishing scams?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  11. Securing Critical National Infrastructure: The Top Four Obstacles to Overcome

    Why is securing CNI such a challenge and how you can build your strategy for this effort?

    1. Photo of Zane Blomgren

      Zane Blomgren

      senior security engineer, Tripwire

    2. Photo of Dean Ferrando

      Dean Ferrando

      systems engineering manager, Tripwire

  12. The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay

    What are the main tricks being pulled by cyber-criminals to lure victims?

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  13. #WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies

    Orgs must develop proper backup and recovery strategies now

    1. Photo of Ryan Crompton

      Ryan Crompton

      Senior Product Manager, Carbonite

  14. #WorldBackupDay: How to Protect the Last Line of Defense

    How can orgs ensure their backups are safe?

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  15. Software-Defined Telecommunications and the Risk of DDoS

    What will be the security risks associated with 5G telecoms and its associated architecture?

    1. Photo of Sam Cohen

      Sam Cohen

      Cybersecurity Consultant, Deloitte

  16. #HowTo: Use Marketing Principles to Gain Employee Buy-In and Results

    Can marketing principles enhance security awareness training?

    1. Photo of Ashley Rose

      Ashley Rose

      CEO, Living Security

  17. How Behavioral Biometrics is Combating Credential Stuffing Attacks

    Can biometrics mitigate bad cybersecurity behaviors?

    1. Photo of Anton Klippmark

      Anton Klippmark

      Product Manager, BehavioSec

  18. Was it a Breach or Credential Stuffing? The Difference Matters

    It's important for victims to recognize the difference between breaches and credential stuffing attacks to respond appropriately

    1. Photo of Olivia Fryt

      Olivia Fryt

      senior security researcher, SpyCloud

  19. Re-engineering Cyber-Consciousness of the Human Element of Cybersecurity

    How can orgs quantify the human element of cybersecurity?

    1. Photo of Saket Modi

      Saket Modi

      Co-founder and CEO, Lucideus

  20. #HowTo: Optimize Certificate Management to Identify and Control Risk

    How should orgs approach certificate management in a distributed workforce?

    1. Photo of Tim Callan

      Tim Callan

      Chief Compliance Officer, Sectigo

What’s hot on Infosecurity Magazine?