Infosecurity Opinions

  1. The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering

    How to take ownership of your data’s security as part of your cloud strategy

    1. Photo of Dinesh Rao

      Dinesh Rao

      EVP and Global Head of Enterprise Application Services, Infosys

  2. Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back

    As the internet expands, and bots become more essential to maintaining it

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

  3. Creating a Modern Office that Appeals to Techy Staff

    Creating a great work environment is essential.

  4. Using Machine Learning to Transform Data into Cyber Threat Intelligence

    Combination of threat analysis and data analysis with machine learning can help security teams turn raw data into cyber threat intelligence.

    1. Photo of Tawnya Lancaster

      Tawnya Lancaster

      Lead Product Manager, Alien Labs, AT&T Cybersecurity

  5. Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach

    Steps IT teams can take to achieve better cybersecurity for your remote workers.

    1. Photo of Jason Dettbarn

      Jason Dettbarn

      Founder and CEO of Addigy

  6. Securing Active Directory

    Every computer on the company’s network must have some level of access to AD for the network environment to function correctly.

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  7. Losing the Human Touch to Protect Data

    Why it is important to remove users from the equation if we want to protect data and deliver inherent security

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  8. Delving Into the Weaponization of AI

    To the surprise of almost no-one, AI is being weaponized by cyber adversaries.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  9. No Time for Email Protection Roulette

    Extra caution should be exercised when safeguarding not just what’s coming in, but also what’s going out, via email.

    1. Photo of Jamie Manuel

      Jamie Manuel

      VP Product Management, Titus

  10. Dealing with Legacy Open Source—Issues and Solutions

    An alarming number of organizations consuming open source are not applying the patches they need

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  11. Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer

    The number of “bad bots” continues to grow.

    1. Photo of Andrew Useckas

      Andrew Useckas

      CTO at ThreatX

  12. #HowTo Make Security Expertise Accessible to Developers

    How security champion programs can make security expertise accessible to developers

    1. Photo of Dan Cornell

      Dan Cornell

      CTO and Principal, Denim Group

  13. Checkmate: Cybersecurity Strategy on the Modern Battlefield

    It is World Chess Day! What can modern cybersecurity learn from the game of chess?

    1. Photo of Rich  Turner

      Rich Turner

      Senior Vice-President EMEA, CyberArk

  14. How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World

    Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.

    1. Photo of Aaron Branson

      Aaron Branson

      Vice president of Marketing at Netsurion

  15. Cybersecurity Recuperation: Ensuring a Safe Return to Work

    Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.

    1. Photo of Geert van der Linden

      Geert van der Linden

      Executive Vice President of Cybersecurity, Capgemini

  16. Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

    Security teams need to exercise an awareness of what methods are becoming newly popular among bad actors

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  17. Why Compliance Certifications Demand a Strong Stance in Technology Business Continuity

    Why compliance certifications prove that you uphold best industry practices

    1. Photo of Jordan MacAvoy

      Jordan MacAvoy

      VP of Marketing, Reciprocity Labs

  18. Using Threat Deception to Thwart Malicious Insiders

    Like death and taxes, malicious insiders are a certainty of life

    1. Photo of Gil Shulman

      Gil Shulman

      VP of Products, Illusive Networks

  19. Stop Ignoring Two-Factor Authentication Just Because You’re Lazy

    Laziness literally becomes the weakest point in their data protection systems

    1. Photo of Addison Shaw

      Addison Shaw

      Content Editor and Freelance Writer

  20. Improving Banking Experiences with Biometrics

    Using the correct biometrics will enable banks and financial institutions to enhance customer experiences

    1. Photo of Olga Ezzheva

      Olga Ezzheva

      Technical writer at Oxagile

What’s hot on Infosecurity Magazine?