Infosecurity Opinions

  1. Why Storytelling Should be at the Heart of Security Training

    The answer to engaging awareness content lies in storytelling

    1. Photo of Simeon Quarrie

      Simeon Quarrie

      founder and CEO of VIVIDA

  2. It’s Time to Fight Back and Protect our Critical Infrastructure

    We are still in the throes of a pandemic, but it should be an imperative to get your data back under control.

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  3. IoT Security: Everything Starts with Awareness #NCSAM

    Is one month enough time to plant the right cybersecurity seeds and make an impact within the IoT community?

    1. Photo of Don Schleede

      Don Schleede

      Information Security Officer at Digi International

  4. The Threat From Within – A Genuine Horror Story

    Which steps you can take to ensure security doesn't give you a fright this Halloween

    1. Photo of Rashid Ali

      Rashid Ali

      Enterprise Sales Manager, UKI & Nordics, Wallix

  5. Security Threats Facing Universities

    Universities weakened by COVID impact can be easy prey for cyber-attack; it’s time to fight back

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

  6. The Case for a Federated Responsibility Model for Application Security to Power Secure DevOps

    Centralized control model no longer applies to today’s software-defined world

    1. Joanne Godfrey

      Security Evangelist, ZeroNorth

  7. Information Security in Agile Development

    Changes to be made to support the transformation of software development within an Agile framework.

    1. Photo of Gerald  Pang

      Gerald Pang

      Information Risk Manager

  8. Why Does The Software Defined Perimeter (SDP) Matter?

    Organizations using hosting options should use a VPN and SDP to ensure security and a positive user experience

    1. Photo of Achi Lewis

      Achi Lewis

      EMEA Director for NetMotion

  9. #HowTo Enhance Borderless Networks with Cloud-Managed DDI #NCSAM

    Flexible organizations require a flexible solution

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  10. Why Your CSPM Might Be Falling Short

    Why the traditional CSPM model falls short within cloud-native organizations

    1. Photo of Idan Tendler

      Idan Tendler

      Co-founder and CEO, Bridgecrew

  11. CISOs: Here are the Cybersecurity Concerns Boards Really Care About

    As companies tighten budgets going into 2021, it’s important to communicate security ROI in an understandable language

    1. Photo of Colin O’Connor

      Colin O’Connor

      Chief Operating Officer of ReliaQuest

  12. Account Takeover Risks of Small Businesses: How to Avoid Them

    How to detect, and recover, from account takeover attacks

    1. Photo of Ben Hartwig

      Ben Hartwig

      Web operations director at InfoTracer

  13. Is Encryption the Answer to Data Security Post Lockdown? #NCSAM

    If businesses want to secure data on the move, it is essential that encryption and endpoint control is applied to all devices

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  14. Preventing Business Email Compromise Calls for Analyzing Email Language

    Most email security tools are designed to look for the what and the who

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  15. Ripple20 Isn’t An Anomaly – IoT Security Is A Mess (Still) #NCSAM

    Ripple20 isn’t the only IoT security fiasco, it’s just the latest

    1. Photo of Jeff Costlow

      Jeff Costlow

      CISO, Extrahop

  16. Mythbusters: Three Misconceptions About Zero Trust

    What’s the key to achieving perfect Zero Trust?

    1. Photo of Michael Covington

      Michael Covington

      VP of Product Strategy, Jamf

  17. Cybersecurity Lessons Learned from Data Breaches and Brand Trust Matters

    Public confidence in your digital security – is make-or-break for your business, not just part of your compliance checklist.

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  18. Old Tools, New Tricks: How AI Can Extend Existing Security Investments to Meet New Challenges

    Utilizing AI and machine learning technology really can be a game-changer for identity

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  19. How do Organizations Choose a Cloud Service Provider? Is it Like an Arranged Marriage?

    Have you ever had to make a critical decision rationalised by clear value drivers but heavily reliant on trust?

    1. Photo of Dalia Kader

      Dalia Kader

      Information Security Manager

    2. Photo of Husna Siddiqi

      Husna Siddiqi

      Information Protection Audit Management Lead

  20. The Digital Transformation Reckoning Caused By COVID-19

    How companies survived a rapid and forced digital transformation.

    1. Photo of Joe Vadakkan

      Joe Vadakkan

      Cloud Security Leader at Optiv Security

What’s hot on Infosecurity Magazine?