Infosecurity Opinions

  1. Stop Punching in the Dark

    The blind spot of visibility is not only going unaddressed, it’s getting bigger and bigger

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  2. Cyber Resilience During Times of Uncertainty

    A cyber resilience approach is based on the premise of organizing defenses to prioritize resiliency over security to keep your business going

    1. Photo of Tom Patterson

      Tom Patterson

      Chief Trust Officer, Unisys

  3. #HowTo Master Cybersecurity Training with a Third Party

    Without specialist in-house teams, staying on top of cybersecurity matters is a challenge for SMBs

    1. Photo of Jay Ryerse

      Jay Ryerse

      CISSP, VP of Cybersecurity Initiatives at ConnectWise

  4. What Can We Learn About Cybersecurity From the 2020 Elections?

    Lessons learned from this election, and for what can be utilized in the future

    1. Photo of Yotam Gutman

      Yotam Gutman

      Marketing Director at SentinelOne, SentinelOne

  5. Why Don’t You Have a Certificate Manager?

    Certificate management is important and few enterprises have the necessary talent and expertise to do the job

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  6. Countering Threat Data Overload: The Importance of Curation

    Why data curation is the future of threat intelligence

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  7. Proactively and Securely Reducing Your Organization’s Data Footprint

    Active data erasure is one aspect that is essential.

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  8. The Need for Continuous Authentication

    Implementation of continuous authentication schemes should be transparent to employees

    1. Photo of Sid Potbhare

      Sid Potbhare

      CEO at Untethered Labs

  9. Why Cybersecurity isn’t What You Think it is

    Are we all becoming cybersecurity snobs?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  10. The Convergence of Ransomware and Public Relations

    Have a plan in place that outlines how you will handle a ransomware incident

    1. Photo of Meredith Griffanti

      Meredith Griffanti

      Managing Director, Washington, DC, FTI Consulting

    2. Photo of Evan Roberts

      Evan Roberts

      Senior Director, New York, FTI Consulting

  11. Defend Yourself Against Dark Data

    How can you protect your company against dark data?

    1. Photo of Amar Kanagaraj

      Amar Kanagaraj

      Founder & CEO, oneDPO

  12. Close the Online Trust Gap With Identity Proofing

    The goal is to balance a better customer experience with a strong company position.

    1. Photo of Ryan Alexander

      Ryan Alexander

      VP of Fraud Product Management at Prove

  13. BYOD and Enterprise Apps: Balancing Security and Employee Privacy

    IT needs to protect data without compromising employee privacy.

    1. Photo of Tom Tovar

      Tom Tovar

      CEO and co-creator of Appdome

  14. Why I’m Not Sold on Autonomous Security

    Can ML-powered IDS become a fully autonomous network defense?

    1. Photo of Dr. David Brumley

      Dr. David Brumley

      CEO and co-founder, ForAllSecure

  15. #HowTo Adopt an Identity-Centric Security Approach

    A forward-thinking company uses an identity-centric security approach to reduce the risk of a breach or failed audit

    1. Photo of Stephen Lee

      Stephen Lee

      Vice President, Technical Strategy & Partnerships, Okta

  16. The Secure SD-WANderful Approach to Securing Your Workers at Home and in the Office

    Secure SD-WAN provides the scalability, performance, and security necessary to make sure this flexibility is a reality.

    1. Photo of Michael Wood

      Michael Wood

      CMO, Versa Networks

  17. Redefine the Risk Dynamic Within Your Business to Enhance Innovation And Development

    Redefine how your business sees risk, and create a predictable model for investing in risk-reduction that accelerates speed-to-market

    1. Russell Coleman

      EMEA Sales Manager, HackerOne

  18. Key Management with Acuity: On-Premises, Cloud, Hybrid

    Sophisticated key management solutions are essential to any cryptographic operation

    1. Photo of Adam Cason

      Adam Cason

      vice president, global and strategic alliances, Futurex

  19. How to Organize Employees to Cooperate in Threat Mitigation

    Cooperation is important for mitigating cybersecurity threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  20. Why Storytelling Should be at the Heart of Security Training

    The answer to engaging awareness content lies in storytelling

    1. Photo of Simeon Quarrie

      Simeon Quarrie

      founder and CEO of VIVIDA

What’s hot on Infosecurity Magazine?