Infosecurity Opinions

  1. The Gig Economy: A New Battleground for Cybersecurity

    The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  2. DFIR, Threat Hunting, and Navigating COVID-19 Lockdowns

    When it comes to advanced DFIR and threat hunting, being remote has proven cumbersome at best and highly restrictive at worst.

    1. Photo of Vikram Chabra

      Vikram Chabra

      Head of the cybersecurity practice at Netenrich

  3. Why Microservices Require Unified Tools for Authorization

    How do businesses handle microservice authorization controls?

    1. Photo of Tim Hinrichs

      Tim Hinrichs

      Co-creator of Open Policy Agent and CTO at Styra

  4. Don’t Compromise: Securing Your Company’s Data Amid Remote Working and Lay-offs

    How will healthcare companies' security recover after the pandemic?

    1. Photo of Caleb Barlow

      Caleb Barlow

      CEO, CynergisTek

  5. Fixing the Biggest IoT Issue — Data Security

    Without the introduction of the AIoT, the growth of applications across all areas of our lives would be significantly diminished

    1. Photo of Mark Lippett

      Mark Lippett

      CEO, XMOS

  6. Grassroots Data Security: Leveraging User Knowledge to Set Policy

    Deep learning gives us two tools to do it: representation learning and anomaly detection.

    1. Photo of Karthik Krishnan

      Karthik Krishnan

      CEO, Concentric

  7. Building a Blueprint for a Successful Micro-segmentation Implementation

    How organizations can implement and manage SDN-enabled micro-segmentation strategies

    1. Photo of Avishai Wool

      Avishai Wool

      CTO, AlgoSec

  8. How Prepared is Your Business to Face Botnet Threats

    To be on the safe side, you need to understand the implications of these attacks and know the precautions to take

    1. Photo of Adedeji  Adewale

      Adedeji Adewale

      Founder of Digita-index

  9. #HowTo Choose a Link Analysis Tool

    These tools visualize data and draw relationships between otherwise disparate pieces of information

    1. Photo of Peter Prizio

      Peter Prizio

      Vice President of Product Management at King & Union

  10. Securing Smart Cities of the Future

    Managing the cyber-risks of smart cities is crucial in realizing their potential

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  11. How Traditional Machine Learning Is Holding Cybersecurity Back

    Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats

    1. Photo of Stephen Salinas

      Stephen Salinas

      Head of Product Marketing, Deep Instinct, Deep Instinct

  12. The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering

    How to take ownership of your data’s security as part of your cloud strategy

    1. Photo of Dinesh Rao

      Dinesh Rao

      EVP and Global Head of Enterprise Application Services, Infosys

  13. Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back

    As the internet expands, and bots become more essential to maintaining it

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

  14. Creating a Modern Office that Appeals to Techy Staff

    Creating a great work environment is essential.

  15. Using Machine Learning to Transform Data into Cyber Threat Intelligence

    Combination of threat analysis and data analysis with machine learning can help security teams turn raw data into cyber threat intelligence.

    1. Photo of Tawnya Lancaster

      Tawnya Lancaster

      Lead Product Manager, Alien Labs, AT&T Cybersecurity

  16. Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach

    Steps IT teams can take to achieve better cybersecurity for your remote workers.

    1. Photo of Jason Dettbarn

      Jason Dettbarn

      Founder and CEO of Addigy

  17. Securing Active Directory

    Every computer on the company’s network must have some level of access to AD for the network environment to function correctly.

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  18. Losing the Human Touch to Protect Data

    Why it is important to remove users from the equation if we want to protect data and deliver inherent security

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  19. Delving Into the Weaponization of AI

    To the surprise of almost no-one, AI is being weaponized by cyber adversaries.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  20. No Time for Email Protection Roulette

    Extra caution should be exercised when safeguarding not just what’s coming in, but also what’s going out, via email.

    1. Photo of Jamie Manuel

      Jamie Manuel

      VP Product Management, Titus

What’s hot on Infosecurity Magazine?