Infosecurity Opinions

  1. Navigating the Benefits and Challenges of AI Implementation as New Threats Loom

    How can security pros leverage AI effectively to protect against cyber-attacks?

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  2. Why COVID-19 Vaccine Disinformation is a Key Risk in 2021

    How can misinformation online about COVID-19 vaccines be tackled?

    1. Photo of Samantha North

      Samantha North

      disinformation researcher and director, North Cyber Research

  3. #HowTo: Build a Business Case for Cybersecurity Investment

    How can you successfully make the case for more cybersecurity investment?

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  4. Privacy Post-COVID: Predictions for 2021

    What will be the major privacy challenges to organizations this year?

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  5. 2021 Predictions: A Time to Reap Benefits from 2020’s Shift to ‘Remote Everything’

    Will organizations focus on updating their security in 2021 following the shift to remote working?

    1. Photo of Ryan Olson

      Ryan Olson

      Vice President of Threat Intelligence for Unit 42, Palo Alto Networks

  6. How to Bridge the IT and Cyber Skills Gap in 2021

    Educational programs must adapt to address the cyber skills gap

    1. Photo of Gil Adani

      Gil Adani

      CEO, HackerU

    2. Photo of Arnon Shiboleth

      Arnon Shiboleth

      Co-CEO, Prytek

  7. Making PCI Compliance a Good Habit

    What causes a company’s compliance to slip, after the all-important first audit?

    1. Photo of Innes French

      Innes French

      Data Protection Officer, PCI Pal

  8. Five Common Excuses for Lack of Firmware Security

    No one should assume their firmware is already secure – it is an ongoing process.

    1. Photo of Sergej Epp

      Sergej Epp

      Chief Security Officer, Central Europe, Palo Alto Networks

  9. SAD Reality for DNS

    This time it's SAD, in more ways than one

    1. Photo of Dana Iskoldski

      Dana Iskoldski

      Corporate Communications Manager for BlueCat

  10. How to Transform Your Cybersecurity Posture

    Not only does security by design lift your profits, it also places them on footing that’s stable.

    1. Photo of Michael Coden

      Michael Coden

      Head of the cybersecurity practice at BCG Platinion

  11. “What About Cybersecurity?” Best Practices for Secure IIoT Wireless Sensor Deployment

    Some of the most common questions I hear about securing IIoT sensor systems, and some recommendations

    1. Photo of Ray Almgren

      Ray Almgren

      CEO, Swift Sensors

  12. Automation for Better or Worse in 2021

    Automation will drive a tidal wave of spear phishing but will also help cloud hosting providers to crack down on phishing and other malicious activities

    1. Photo of Corey Nachreiner

      Corey Nachreiner

      CTO, WatchGuard Technologies

  13. The Coronavirus Pandemic is Widening the Cybersecurity Skills Gap

    COVID-19 is challenging us and exposing flaws that we have avoided dealing with for some time now

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  14. Be a Hacker in Ten Minutes With No Expertise Required

    Credential stuffing isn’t just a problem for individual victims, it’s a big problem for businesses too.

    1. Photo of Andy Still

      Andy Still

      CTO, Netacea

  15. What Does 2021 Hold for Cybersecurity?

    Even once the COVID-19 pandemic is finally in the rear-view mirror, it’s unlikely related trends will reverse

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  16. Maintaining Control Over Your Security Infrastructure in a Multi-Cloud World

    Why is it important for organizations to retain control of the keys?

    1. Photo of David Close

      David Close

      Chief solutions architect, Futurex

  17. Protecting Your Online Services From DDoS Attacks

    Practical advice and real experiences of surviving DDoS attacks

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  18. Developers are in the Driver’s Seat: What Does it Mean for Security?

    In this evolving model, security takes on a consultative role for developers focusing on policy, governance, and oversight

    1. Photo of Chris Wysopal

      Chris Wysopal

      CTO, Veracode

  19. The World Has Changed - Here’s How to Get the Board to Realize It

    Enterprise IT has changed dramatically in the last year, but that doesn't mean that the conversation has changed the boardroom.

    1. Photo of Jamie Moles

      Jamie Moles

      Senior Security Engineer, Extrahop

  20. Think Like an Attacker: Effectively Addressing Targeted Phishing and Fraud

    With threat activity continuing to rise, it’s crucial that organizations stay vigilant in identifying and remediating threats posed to them.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

What’s hot on Infosecurity Magazine?