Infosecurity Opinions

  1. Why Don’t You Have a Certificate Manager?

    Certificate management is important and few enterprises have the necessary talent and expertise to do the job

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  2. Countering Threat Data Overload: The Importance of Curation

    Why data curation is the future of threat intelligence

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  3. Proactively and Securely Reducing Your Organization’s Data Footprint

    Active data erasure is one aspect that is essential.

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  4. The Need for Continuous Authentication

    Implementation of continuous authentication schemes should be transparent to employees

    1. Photo of Sid Potbhare

      Sid Potbhare

      CEO at Untethered Labs

  5. Why Cybersecurity isn’t What You Think it is

    Are we all becoming cybersecurity snobs?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  6. The Convergence of Ransomware and Public Relations

    Have a plan in place that outlines how you will handle a ransomware incident

    1. Photo of Meredith Griffanti

      Meredith Griffanti

      Managing Director, Washington, DC, FTI Consulting

    2. Photo of Evan Roberts

      Evan Roberts

      Senior Director, New York, FTI Consulting

  7. Defend Yourself Against Dark Data

    How can you protect your company against dark data?

    1. Photo of Amar Kanagaraj

      Amar Kanagaraj

      Founder & CEO, oneDPO

  8. Close the Online Trust Gap With Identity Proofing

    The goal is to balance a better customer experience with a strong company position.

    1. Photo of Ryan Alexander

      Ryan Alexander

      VP of Fraud Product Management at Prove

  9. BYOD and Enterprise Apps: Balancing Security and Employee Privacy

    IT needs to protect data without compromising employee privacy.

    1. Photo of Tom Tovar

      Tom Tovar

      CEO and co-creator of Appdome

  10. Why I’m Not Sold on Autonomous Security

    Can ML-powered IDS become a fully autonomous network defense?

    1. Photo of Dr. David Brumley

      Dr. David Brumley

      CEO and co-founder, ForAllSecure

  11. #HowTo Adopt an Identity-Centric Security Approach

    A forward-thinking company uses an identity-centric security approach to reduce the risk of a breach or failed audit

    1. Photo of Stephen Lee

      Stephen Lee

      Vice President, Technical Strategy & Partnerships, Okta

  12. The Secure SD-WANderful Approach to Securing Your Workers at Home and in the Office

    Secure SD-WAN provides the scalability, performance, and security necessary to make sure this flexibility is a reality.

    1. Photo of Michael Wood

      Michael Wood

      CMO, Versa Networks

  13. Redefine the Risk Dynamic Within Your Business to Enhance Innovation And Development

    Redefine how your business sees risk, and create a predictable model for investing in risk-reduction that accelerates speed-to-market

    1. Russell Coleman

      EMEA Sales Manager, HackerOne

  14. Key Management with Acuity: On-Premises, Cloud, Hybrid

    Sophisticated key management solutions are essential to any cryptographic operation

    1. Photo of Adam Cason

      Adam Cason

      vice president, global and strategic alliances, Futurex

  15. How to Organize Employees to Cooperate in Threat Mitigation

    Cooperation is important for mitigating cybersecurity threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  16. Why Storytelling Should be at the Heart of Security Training

    The answer to engaging awareness content lies in storytelling

    1. Photo of Simeon Quarrie

      Simeon Quarrie

      founder and CEO of VIVIDA

  17. It’s Time to Fight Back and Protect our Critical Infrastructure

    We are still in the throes of a pandemic, but it should be an imperative to get your data back under control.

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  18. IoT Security: Everything Starts with Awareness #NCSAM

    Is one month enough time to plant the right cybersecurity seeds and make an impact within the IoT community?

    1. Photo of Don Schleede

      Don Schleede

      Information Security Officer at Digi International

  19. The Threat From Within – A Genuine Horror Story

    Which steps you can take to ensure security doesn't give you a fright this Halloween

    1. Photo of Rashid Ali

      Rashid Ali

      Enterprise Sales Manager, UKI & Nordics, Wallix

  20. Security Threats Facing Universities

    Universities weakened by COVID impact can be easy prey for cyber-attack; it’s time to fight back

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

What’s hot on Infosecurity Magazine?