Infosecurity Opinions

  1. Protecting Your Online Services From DDoS Attacks

    Practical advice and real experiences of surviving DDoS attacks

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  2. Developers are in the Driver’s Seat: What Does it Mean for Security?

    In this evolving model, security takes on a consultative role for developers focusing on policy, governance, and oversight

    1. Photo of Chris Wysopal

      Chris Wysopal

      CTO, Veracode

  3. The World Has Changed - Here’s How to Get the Board to Realize It

    Enterprise IT has changed dramatically in the last year, but that doesn't mean that the conversation has changed the boardroom.

    1. Photo of Jamie Moles

      Jamie Moles

      Senior Security Engineer, Extrahop

  4. Think Like an Attacker: Effectively Addressing Targeted Phishing and Fraud

    With threat activity continuing to rise, it’s crucial that organizations stay vigilant in identifying and remediating threats posed to them.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  5. Keeping Up With the Uncertainty of Shifting Global Data Protection Regulations

    Examining some of the biggest changes seen in 2020, what the next year holds for businesses, and how organizations can remain compliant across the world.

    1. Photo of Chris Strand

      Chris Strand

      Chief Compliance Officer at IntSights

  6. Protecting Asia Pacific Businesses’ Online Presence

    Security concerns, local requirements and regulatory issues are just some of the domain management challenges companies are facing in the region.

    1. Photo of Statton Hammock

      Statton Hammock

      head of IP strategy, government & industry relations at Clarivate

    2. Photo of Heidi Zhang

      Heidi Zhang

      Manager of government and industry relations at Clarivate

  7. 3-2-1, No Thank You

    It is always the data owner’s responsibility to keep copies of their data.

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  8. Preparing for Disaster: How UK Healthcare can Ready Itself For a Ransomware Onslaught

    UK healthcare need to build on best practices to help with prevention, enhancing resilience and rapid threat detection and response

    1. Photo of Peter Beardmore

      Peter Beardmore

      Director, Digital Risk Strategy at RSA Security

  9. What the NIST Framework Misses About Cloud Security

    The four things the NIST framework misses, and one that is spot on

    1. Photo of Doug Hazelman

      Doug Hazelman

      VP, CoreView

  10. Why Are More People Not Automating Certificate Management?

    What is scaring enterprises away from automation?

    1. Photo of Avesta Hojjati

      Avesta Hojjati

      Head of R&D, DigiCert

  11. Prevent Ransomware From Taking the Podium With Layered Security

    It’s crucial organizations understand and know how to defend themselves from what is now often a sophisticated, three-stage attack.

    1. Photo of Chris Goettl

      Chris Goettl

      Product Manager, Ivanti

  12. The Three Characteristics of a Defensible Security Program

    Principles to help you continuously improve the effectiveness and efficiency of your security controls

    1. Photo of Tom Scholtz

      Tom Scholtz

      Research VP, Gartner

  13. Automated Penetration Testing – Can it Replace Humans?

    Are human pen testers heading for redundancy, and can we replace them with tools?

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  14. How Should CISOs Combat Rising "Soft" Attacks?

    Defending against the more targeted “soft attack”

    1. Photo of Otavio Freire

      Otavio Freire

      President & CTO, SafeGuard Cyber

  15. #HowTo: Optimize Your 2021 Security Spend

    How do you reduce your security risk with tightened budgets?

    1. Photo of Tony Velleca

      Tony Velleca

      CEO, Cyberproof and CISO, UST Global

  16. Security from the White House

    How President-elect Joe Biden can tackle a challenging cybersecurity landscape.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  17. From BIAS to Sweyntooth: Eight Bluetooth Threats to Network Security

    Bluetooth has a history of vulnerabilities that continues to put corporations at risk of a major security breach

    1. Photo of Bob Baxley

      Bob Baxley

      CTO at Bastille Networks

  18. #HowTo Write the Perfect Op-Ed, and Get it Published!

    Outgoing deputy editor Dan Raywood offers advice on how to produce the perfect opinion article

  19. Credential Stuffing – Are You Doing Enough?

    Why an old style attack just will not go away.

    1. Photo of Stuart Jubb

      Stuart Jubb

      Head of consulting at Crossword Cybersecurity

  20. Financial Services Industry Under Attack from a Surge in Credential Stuffing

    Compromised credentials are a threat to multiple sites when a data breach occurs

    1. Photo of Mike Wilson

      Mike Wilson

      Founder & CTO, Enzoic

What’s hot on Infosecurity Magazine?