Infosecurity Opinions

  1. The Role of Containerization to Protect Enterprise Cloud Ecosystems

    The security posture of unmanaged endpoints is below that of the organization’s managed devices

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  2. Remote Working: How To Protect Your Employees’ Mental Health

    Coping with everything that’s happening and the shift to working in isolation is proving rather difficult for many workers.

    1. Photo of Orion Talmay

      Orion Talmay

      Wellness Expert

  3. We Don’t Need More Cybersecurity, We Need Better Cybersecurity

    Why are data breaches becoming more frequent and more costly?

    1. Photo of Jason Revill

      Jason Revill

      Director of UK and Ireland Security Consulting, Avanade

  4. Why You Want to Fail a Red Team Exercise

    Why failing a Red Team exercise is good and what happens afterwards is more important.

    1. Photo of Gemma Moore

      Gemma Moore

      Director, Cyberis

  5. The Do’s and Don’ts of Building a Cybersecurity Program

    Pointers on the do’s and don’ts of building an effective security program.

    1. Photo of Nick Frost

      Nick Frost

      Director of Cyber Risk Management Group (CRMG)

  6. Bad UX Design Always Leads to Compromised Security

    When you make things with the user in mind, you create experiences that are free of frustrations

    1. Photo of Jacqueline Carter

      Jacqueline Carter

      Software engineer and a tech writer

  7. Business as (un)usual: Communicating During a Pandemic, and Beyond

    A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  8. #HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering

    Social engineering is also a matter of thinking out of the box

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  9. How the MSSPs Can Strive to be Detection Ninjas

    An MSSP engineers for both situational awareness and situational consistency.

    1. Photo of Pukhraj Singh

      Pukhraj Singh

      Product Owner, Cyber Threat Detection, SilverSky by BAE Systems

  10. The Bigger Perimeter Picture of #COVID19

    Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model

    1. Photo of Phil Allen

      Phil Allen

      VP EMEA, Ping Identity

  11. Reinventing the Role of the Tier 1 SOC Analyst

    Organizations are leaning on cutting-edge technology that can improve the productivity of security analysts

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  12. What Actually IS a Cyber Range, and How Has It Evolved?

    A next-generation virtual cyber range prepares SOC analysts for real-world cyber attacks — here's how

    1. Photo of Debbie Gordon

      Debbie Gordon

      CEO and Founder of Cloud Range Cyber

  13. Automating Security With Intelligence

    Threat actors use automation for a whole range of activities necessary for the cyber kill chain, from reconnaissance to exfiltration.

    1. Photo of Karen Levy

      Karen Levy

      Vice President, Product and Client Marketing, Recorded Future

  14. Advantages and Disadvantages of Active vs. Passive Scanning in IT and OT Environments

    Connecting IT and OT technology can also have its drawbacks, especially when considering cybersecurity and fail-safety.

    1. Photo of Chris Sherry

      Chris Sherry

      Regional Vice President EMEA, Forescout

  15. Preparing for Tomorrow: Cybersecurity in a Remote World

    The cost effective option of permanent remote working

    1. Photo of Chris Jenkins

      Chris Jenkins

      Sales Director, UK and Ireland, Proficio

  16. Is a Wiped Computer Truly Wiped?

    Just because data appears to be gone doesn’t mean that it really is

    1. Mike Savitz

      Principal Consultant, The Crypsis Group

  17. Why SASE Can be Your Solution in a Time of Uncertainty

    With COVID-19 we may see Gartner’s projection about Secure Access Service Edge (SASE) adoption

    1. Photo of Dave Martin

      Dave Martin

      Senior Director, Product Management of Threat Response at Open Systems

  18. The Key to Successfully Managing Cyber Risk: Speed

    No matter how much visibility, continuous monitoring or data crunching you do, none of it matters if the enemy outpaces that effort.

    1. Photo of Grant Moerschel

      Grant Moerschel

      VP Product Marketing, SentinelOne

  19. RE: Thinking Email Security

    Legacy email defenses assume trust, which means that sophisticated account takeovers often go completely unnoticed

    1. Photo of Mariana  Pereira

      Mariana Pereira

      Director of Email Security Products, Darktrace

  20. The Cyber Terrain Infestation: Efficacy of Multi-Stakeholder Initiatives

    Multi-stakeholder initiatives are not new, they have emerged as an attractive new form of governance

    1. Photo of Elisabetta Zaccaria

      Elisabetta Zaccaria

      Strategic Advisor to the Board, Secure Chorus

What’s hot on Infosecurity Magazine?