Infosecurity Opinions

  1. 2021: The Year of the QR Code for Digital Health Apps

    Do QR Codes provide effective data security and privacy in the transfer of personal health information?

    1. Photo of Adam Palmer

      Adam Palmer

      Co-CEO, Tento Health

  2. Is $50,000 for a Vulnerability Too Much?

    Should we welcome the rise in payouts for crowdsourced security programs?

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  3. Cybersecurity in Financial Services: Securing the Future of Organizations in the Post-COVID World

    The financial services industry is facing increased cyber-risks

    1. Photo of Rajashekara Maiya

      Rajashekara Maiya

      VP, Global Head-Business Consulting, Finacle at Infosys

  4. Don’t Stand Up Data Protection this #ValentinesDay

    Achieving the perfect security relationship that allows collaboration without compromise

    1. Photo of Nick Turner

      Nick Turner

      VP EMEA, Druva

  5. How to Stay Safe When Playing With Cryptocurrencies

    What have the recent Bitcoin password stories taught us about securing assets?

    1. Photo of Ian Pitt

      Ian Pitt

      CIO, LogMeIn

  6. #WomenInScience: Gender Diversity Key to Well-Rounded Cybersecurity

    Consumer perception, female engagement and the merging of gender norms make women integral for the future of cybersecurity

    1. Photo of Stephanie Schultz

      Stephanie Schultz

      executive director, Trusted Computing Group

  7. The New Economics of Holding Personal Data in 2021

    The cost of data breaches is set to surge in the coming year

    1. Photo of Patrick Walsh

      Patrick Walsh

      CEO, IronCore Labs

  8. #HowTo: Increase Diversity in Security Teams

    What steps should organizations be taking to improve diversity within their security teams?

    1. Photo of Lisa Ventura

      Lisa Ventura

      Founder, Cyber Security Unity

  9. Pandemic Security: What Have We Learned?

    The COVID-19 pandemic has changed the security landscape forever

    1. Photo of Duncan Godfrey

      Duncan Godfrey

      senior director of security, Auth0

    2. Photo of James Seadon

      James Seadon

      partner, Fieldfisher

  10. SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    On-premises identity resources will increasingly be used to attack cloud environments

    1. Photo of Sean Deuby

      Sean Deuby

      director of services, Semperis

  11. Improving Cybersecurity within Higher Education

    Higher education institutions must respond to the increased threats they are facing

    1. Photo of Enzo Brienza

      Enzo Brienza

      sales manager, InterSystems

  12. The ABCs of TLAs: MDR, EDR and XDR

    The cybersecurity industry needs to adopt consistent standards to avoid customer confusion

    1. Photo of Tom Callahan

      Tom Callahan

      director of MDR operations, PDI

  13. #DataPrivacyDay: New President, More Privacy

    On Data Privacy Day, the tech landscape looks set to change dramatically – and for the better

    1. Photo of Ben Rapp

      Ben Rapp

      Principal, Securys

  14. #DataPrivacyDay: Are Your Employees Putting You at Risk?

    Data privacy is more important than ever

    1. Photo of Dave Barnett

      Dave Barnett

      Head of Edge Protection EMEA, Forcepoint

  15. #DataPrivacyDay: Three Trends Shaping Privacy in 2021

    What will be the biggest developments in data privacy this year?

    1. Photo of Eve Maler

      Eve Maler

      CTO, ForgeRock

  16. A CISO’s 2021 Cybersecurity Wishlist

    What should CISOs' main priorities be for the coming year?

    1. Photo of Vinay Sridhara

      Vinay Sridhara

      CTO, Balbix

  17. #HowTo: Avoid Being Breached

    How organizations can ensure they are prepared to deal with modern cyber-threats

    1. Photo of Sheetal Pansare

      Sheetal Pansare

      President & Global CEO, Futurism Technologies

  18. 5G Technology: Driving the Cybersecurity Evolution

    How organizations can leverage 5G technology to improve their cyber-resilience

    1. Photo of C. P. Gurnani

      C. P. Gurnani

      chief executive officer and managing director, Tech Mahindra

  19. Modernizing vs. Replatforming: Why Choosing the Right Approach Can Impact System Security

    How can organizations keep their mainframe systems secure?

    1. Photo of Adam Glick

      Adam Glick

      chief information security officer, Rocket Software

  20. Rising Supply Chain Risk Requires Proactive Management

    How organizations should prepare for the risk of supply chain attacks

    1. Photo of Ken Fishkin

      Ken Fishkin

      manager, information security, Lowenstein Sandler

    2. Photo of Kathleen McGee

      Kathleen McGee

      partner, The Tech Group, Lowenstein Sandler

What’s hot on Infosecurity Magazine?