Infosecurity Opinions

  1. Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?

    Industry-wide initiative is a necessity to ensure hospitality corporates stand the best chance to succeed

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  2. Why Do Kubernetes and Containers Go Hand in Hand with Machine Learning?

    Containers allow data to work on their Machine Learning and Artificial Intelligence programs and improve them significantly

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  3. Virtual Cybersecurity Professionals Needed During Times of Uncertainty

    Virtual Cybersecurity Professionals are the latest trend in cybersecurity hiring

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  4. Too Many Vulnerabilities, Too Little Time

    Why risk-based vulnerability management needs to be predictive

    1. Photo of Simon Roe

      Simon Roe

      Application Security Product Manager, Outpost24

  5. Moving to the Work From Home SOC

    Troubleshooting is harder when remote

    1. Photo of Chris Triolo

      Chris Triolo

      VP of customer success at Respond Software

  6. How Cloud-Based Training Can Better Enable Remote Workers

    The cloud, after all, is designed to suit the needs of a distributed workforce

    1. Photo of Zvi Guterman

      Zvi Guterman

      Founder and CEO, CloudShare

  7. How You Can Avoid an IoT Doomsday

    The slightest misconfiguration or poor security practices can serve as a point of entry for sophisticated cyber-attacks

    1. Photo of Ken Galvin

      Ken Galvin

      Senior Product Manager for KACE System Management Appliance

  8. #HowTo Cut Costs in the SOC

    Ways where you can reduce costs but not efficiency in your SOC

    1. Photo of Mark Orlando

      Mark Orlando

      Co-founder, Bionic Cyber

    2. Photo of Ryan Shaw

      Ryan Shaw

      Co-founder, Bionic Cyber

  9. Data Security is Everyone’s Problem

    Data security must be management-led, and followed by everyone.

    1. Photo of Alan Bentley

      Alan Bentley

      President of Global Strategy, Blancco

  10. GDPR Two Years On – Has it Gone How we Hoped?

    Two years on, did the introduction of the GDPR go as planned?

    1. Photo of James Chappell

      James Chappell

      Co-Founder & Chief Innovation Officer, Digital Shadows

  11. Why the Industry Needs to Step Up Action on Malicious Domains

    Why steps need to be taken to stamp out malicious domains more than ever

    1. Photo of Patrick Martin

      Patrick Martin

      Head of threat intelligence, Skurio

  12. Bank Data Integrity and #COVID19: Stop Copying Your Data!

    Thanks to COVID-19, everything is disrupted – including how banks handle data security

    1. Photo of Dan   DeMers

      Dan DeMers

      CEO and Co-Founder, Cinchy

  13. Breaking Cryptography: Securing Machine Identities in a Post-Quantum World

    The next quantum generation of machine identities could be unhackable

    1. Photo of Ashish Pala

      Ashish Pala

      Global Security Architect, Venafi

  14. Overcoming the Unique Challenge of Securing OT in the Digital Era

    High-value industries powered by OT are attractive targets for cyber-attacks

    1. Photo of Galina Antova

      Galina Antova

      Chief business development officer and co-founder of Claroty.

  15. Mal-Innovation on Mobile: A Changing Threat Landscape

    When it comes to enterprise mobile security, innovation is the biggest hurdle to overcome

    1. Photo of Michael Covington

      Michael Covington

      VP of Product Strategy, Jamf

  16. Making Security a Business Priority: Four Things to Communicate to Leadership

    Four talking points IT teams can better communicate to avoid a catastrophic cyber incident before it’s too late

    1. Photo of Wade Woolwine

      Wade Woolwine

      Principal Security Researcher, Rapid7

  17. Will COVID-19 be the Catalyst to Finally Replace Passwords With Biometrics?

    Could Coronavirus be the catalyst that pushes us to swap out passwords for more secure and private authentication protocols?

    1. Photo of Paolo Gasti

      Paolo Gasti

      Chief Technology Officer at Keyless Technologies

  18. How Bots Can Attack Your Web Application – And How To Stop Them

    A new focus on sophisticated bots is emerging and how to spot real users from imposters

    1. Mike Tery

      Product manager, WhiteOps

  19. Stop Being Afraid of Granting Network Access to Remote Users, Third Parties and Partners

    Zero Trust Application Access can literally be a game changer for organizations

    1. Photo of Gil Azrielant

      Gil Azrielant

      co-founder and CTO of Axis Security

  20. Viruses Still Spread, Get Ready for Containment

    It’s essential that management be capable of immediate containment, isolation and eradication of these threats.

    1. Photo of John Moynihan

      John Moynihan

      Founder of Minuteman Governance

What’s hot on Infosecurity Magazine?