Infosecurity Opinions

  1. Commercializing Health Data: Where do we Draw the Line?

    What risks do we now face as deeply personal data is traded for research, law enforcement, and government initiatives?

    1. Photo of Adam Kujawa

      Adam Kujawa

      Director, Malwarebytes

  2. COVID-19 Demonstrates Need for Human Error-Proof Security

    80,000 Attacks in One Week – COVID-19 demonstrates the need for human error-proof security

    1. Photo of Nigel Thompson

      Nigel Thompson

      VP, BlackBerry

  3. How a CISO’s Approach to Security Strategy Can Be Shaped By Philosophy

    There is no ‘right’ answer to a problem a CISO can turn to some rather unconventional, but nonetheless appropriate, sources of inspiration.

    1. Photo of Elliot Dellys

      Elliot Dellys

      EMEA Director of Strategic Consulting, Trustwave

  4. #HowTo Evaluate the Security of New Applications

    Every new technology, if not vetted properly from implementation and updated regularly, can leave assets and devices vulnerable

    1. Photo of Chris Hass

      Chris Hass

      Director of Information Security and Research at Automox

  5. Could the Short-Term Future of Enterprise Cybersecurity Lie Within VPN?

    In the rush to deploy the latest security tools, enterprises are overlooking an essential element of cyber defense – the VPN

    1. Photo of Francois Rodriguez

      Francois Rodriguez

      Chief Growth Officer, Adeya

  6. Unified Identity: the Passport to Secure Personal Data Management

    Stemming the leaks of personal data will require a wider re-think of the way we provide, store and process sensitive information.

    1. Photo of Ben Todd

      Ben Todd

      Director of Sales at Nomidio

  7. Data Scientists vs. IT: Aligning on Open-Source Security

    The friction arises when data scientists relying on open-source libraries perceive IT security as a roadblock to production.

    1. Photo of Saundra Monroe

      Saundra Monroe

      Principal product manager, Anaconda

  8. How Does the EC's Vision of an 'Ecosystem of Trust' Fit With the Realities of Microtargeting?

    The EC should be looking for ways to remove the one-way mirror and allow users to take control of their own data and share it much more selectively

    1. Photo of Michal  Gabrielczyk

      Michal Gabrielczyk

      Head of Edge AI at Cambridge Consultants

  9. Handle Misconfigurations in the Cloud

    Cloud misconfiguration is becoming a prevalent source of risk for organizations.

    1. Photo of Aaron Sawitsky

      Aaron Sawitsky

      Senior product marketing manager, Rapid7

  10. Demonstrating Scientific Data Integrity and Security in the Cloud

    Moving to the cloud has many advantages, as it generally meets and exceeds regulatory requirements for data integrity and security

    1. Photo of Damian Tiller

      Damian Tiller

      Quality Assurance Manager, IDBS

  11. Digital Identity Has Changed, and Enterprises Have Not Changed With It

    As the number of enterprise apps has increased, so have new authentication methods and identity tools

    1. Photo of Saira Guthrie

      Saira Guthrie

      Senior Product Marketing Manager, Ping Identity

  12. The Online Harms Bill Cannot Wait

    There is an urgent need to strengthen our defenses against this and other modern threats to keep children safe.

    1. Photo of Charlotte Aynsley

      Charlotte Aynsley

      Safeguarding advisor at Impero

  13. Coming out of the COVID Depression with a Cloud Security Strategy

    All end users sent home from their private corporate networks are now “in” the cloud

    1. Photo of Dan Blum

      Dan Blum

      Managing Partner and Principal Consultant, Security Architects

  14. CISO: Choose Your Weapon

    The selection of security tools must provide the best security affordable and be manageable with the limitations of budget

    1. Dror Hevlin

      Chief Information Security Officer, SolarEdge

  15. #HowTo Improve the Security of Your Containers

    How to embed security by design for containers.

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  16. What's Next After the Big 'Zero Trust' Welcome Back to the Office?

    Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture

    1. Photo of Morgan Wright

      Morgan Wright

      Chief Security Adviser, SentinelOne

  17. Is Critical Infrastructure Ready for Quantum?

    Collectively, we want to realize all of the benefits of quantum without compromising security.

    1. Photo of Scott Totzke

      Scott Totzke

      Chief Executive Officer and Co-Founder of ISARA Corporation

  18. Misconfiguration on the Cloud is as Common as it is Costly

    Remote work has opened profitable new horizons in cybercrime

    1. Photo of Brendan O’Connor

      Brendan O’Connor

      CEO and Co-founder of AppOmni

  19. Getting Your ‘Return’ to Work Strategy, Right

    A robust data management strategy will affect our return to work, it will actually improve our working lives

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  20. Is Your Cloud Backup Ready to Handle a Crisis?

    Keeping down cost and complexity in disaster recovery and business continuity

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

What’s hot on Infosecurity Magazine?