Infosecurity Opinions

  1. #HowTo Support a Zero Trust Model with Automation

    How security and IT operations teams can implement Zero Trust and improve the security posture across hybrid cloud infrastructures.

    1. Photo of Massimo Ferrari

      Massimo Ferrari

      Consulting Product Manager at Red Hat

  2. Is it Time for the Network to Shoulder More of the Burden of Information Security?

    It’s time ISPs became allies rather than observers

    1. Photo of Keith O'Byrne

      Keith O'Byrne

      Head of Solutions, Asavie

  3. Security Initiatives Businesses Must Adopt to Survive in This New World

    If organizations fail to adapt to this new reality, it could leave them unable to pivot quickly

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  4. Decrypting Diversity and Inclusion in Cybersecurity

    How to improve awareness of opportunities for women and help sustain from STEM to the workforce

    1. Photo of Kevin Stenson

      Kevin Stenson

      Chief Executive at The Smallpeice Trust

  5. The Unintended Data Security Consequences of Remote Collaboration

    Every Team or chat created is yet another potential exit point for sensitive data.

    1. Photo of Dave Henderson

      Dave Henderson

      Co-founder BlueFort Security

  6. Using Security Automation to Stay a Step Ahead in these Challenging Times

    How to use automation throughout security efforts to better focus resources and build assurance into security controls and operations

    1. Photo of Mike Mellor

      Mike Mellor

      Head of Security for the Digital Experience business, Adobe

  7. #HowTo Create a Hybrid Remote and Office Work Model

    Five ways IT and security managers can plan for a hybrid work model

    1. Photo of Sagi  Gidali

      Sagi Gidali

      Co-Founder and CPO at Perimeter 81

  8. Don’t Cut Corners while Running LAPS

    Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.

  9. The Cyber Sleeper Cells Lying in Wait for the Return to the Office

    Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  10. Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?

    There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  11. The Ongoing Threat of Telecoms Fraud

    It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.

    1. Photo of Jimmy Jones

      Jimmy Jones

      telecoms cyber security expert at Positive Technologies

  12. Overcoming Healthcare’s Cybersecurity Challenges

    Six recommendations for improving cybersecurity in healthcare

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  13. Partitioned Endpoints Pair Security with Convenience for Home Working

    An endpoint architecture to enable safe, secure and productive home working.

    1. Photo of Ian Ferguson

      Ian Ferguson

      VP Marketing and Strategic Alliances at Lynx Software Technologies

  14. #CyberMonday Risks of a Locked-Down Festive Period for Online Retailers

    It’s highly likely that retailers will still be relying heavily on their online operations to make much needed sales before Christmas.

    1. Photo of David Dickson

      David Dickson

      Head of Enterprise at Superscript

  15. 2020 Was the Year of the Great VPN Comeback, or Was It?

    In this era of remote and mobile work, legacy, hardware-based VPNs have passed their prime

    1. Photo of John Knopf

      John Knopf

      SVP of Product Strategy at NetMotion

  16. Bot is the New Black (Friday): How Retailers Can Fight Back

    Black Friday isn’t only time retailers have to worry about automated shopping bots

    1. Photo of Ameya Talwalker

      Ameya Talwalker

      co-founder Cequence Security

  17. Why Twitter’s High-Profile Users Need to Personally Embrace Security

    This is an indication of the importance Twitter holds to those in the higher ranks of society.

    1. Photo of Niamh Muldoon

      Niamh Muldoon

      senior director of trust and security at OneLogin

  18. Authenticate and Survive – Why Current Options Are Better than Ever

    As employees gain more access to important information, the need for greater security increases.

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  19. Stop Punching in the Dark

    The blind spot of visibility is not only going unaddressed, it’s getting bigger and bigger

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  20. Cyber Resilience During Times of Uncertainty

    A cyber resilience approach is based on the premise of organizing defenses to prioritize resiliency over security to keep your business going

    1. Photo of Tom Patterson

      Tom Patterson

      Chief Trust Officer, Unisys

What’s hot on Infosecurity Magazine?