Infosecurity Opinions

  1. Overconfidence and Under Education – Can Enterprises Ever be Secure?

    Security professionals must get data management right, as a single mistake is all it takes to permanently affect brand equity

    1. Photo of Alan Bentley

      Alan Bentley

      President of Global Strategy, Blancco

  2. COVID-19, Geo Tracking, and Privacy - Where to Draw the Line?

    Amid national lockdowns and growing fear, governments are looking towards curbing the spread of the virus with unconventional means

    1. Photo of Itzhak Assaraf

      Itzhak Assaraf

      CTO at 1touch.io.

  3. If You’re in IT, Never Forget That You’re Also a Risk Manager

    Every information technologist, whatever their specialty or skill set, is a risk manager.

    1. Photo of Alan Brill

      Alan Brill

      Senior Managing Director in Kroll’s Cyber Risk practice

  4. Operationalizing NSA Guidance (or any Guidance, For That Matter!)

    How does one operationalize guidance from the NSA and other elite security organizations?

    1. Photo of Joe Vadakkan

      Joe Vadakkan

      Cloud Security Leader at Optiv Security

  5. Uncovering and Outlining Best Practices for Container Security

    Best practices for container security, and secure approaches when it comes to control, visibility, monitoring, and configuration.

    1. Tim Buntel

      VP of Application Security, Threat Stack

  6. How Close Will We Get to an Autonomous SOC in the Next Decade?

    This is what threat actors are counting on – amidst all this noise, their attempted incursion will be missed

    1. Ian Baxter

      Vice President of Pre-Sales Engineering, IRONSCALES

  7. How Are Digital Natives Shaping the Future of Data Privacy?

    Digital natives have chosen to embrace technology as a permanent constituent of their way of life.

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  8. Respecting Data Privacy Rights Through Data Encryption

    Data privacy must be a top priority for all organizations

    1. John Michael

      CEO, iStorage

  9. Guarding Your Enterprise Cloud Phone System Against Cyber Attacks

    You can only enjoy all the benefits of IP telephony if you have a strong defense system in place

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  10. Closing the Regulatory Loophole: Third Party Breach Notification

    Ignoring third-party notifications of data breaches is a big problem for the breached company.

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

  11. The Mobile Underworld: How Businesses Are Attacked in Murky Parts of the Mobile App Ecosystem

    How attackers can imitate your company with a rogue mobile app

    1. Photo of Fabian Libeau

      Fabian Libeau

      EMEA VP, RiskIQ

  12. Why Automation Holds the Key to Security Governance and a Culture of Collaboration

    How automation can help to unify security operations and open a dialogue with IT and other business stakeholders.

    1. Photo of Massimo Ferrari

      Massimo Ferrari

      Consulting Product Manager at Red Hat

  13. #HowTo Reduce Your Ransomware Attack Surface

    How can your organization significantly improve its chances at surviving a potential ransomware attack?

    1. Photo of Morey Haber

      Morey Haber

      CISO and CTO, BeyondTrust

  14. Working from Home Policies and the Future of Cybersecurity

    The COVID-19 epidemic has re-enforced that the future of cybersecurity is in the cloud

    1. Photo of Paul Martini

      Paul Martini

      CEO, Co-Founder & Chief Architect, iBoss

  15. A Cybersecurity Culture Score

    Looking at the Business Model for Information Security, a way of thinking about information security in a holistic way.

    1. Photo of Ranjit Bhaskar

      Ranjit Bhaskar

      Sr. Security Architect, TWIA

  16. The Future for Network Security: What Does SASE Bring to the Table?

    As part of an overall digital business transformation, organizations will look to SASE

    1. Photo of Yair Green

      Yair Green

      CTO of GlobalDots

  17. Keeping Data Secure in the Always-On World

    Despite the proliferation of sophisticated cyber breaches, always-on availability is a consideration many IT leaders are not prioritizing

    1. Photo of Michael Cade

      Michael Cade

      Senior Global Technologist at Veeam

  18. Why the Wawa Data Breach Serves as a Warning That “Good Enough” is Never Enough

    The most frustrating part of Wawa’s story? That it could’ve been prevented

    1. Photo of Jeff Sakasegawa

      Jeff Sakasegawa

      Trust & Safety Architect, Sift

  19. A First-Class Feature: Security in the Era of Worker Data

    As industries adopt data-rich wearable technologies, it’s imperative that security be prioritized as a first-class feature.

    1. Photo of Bryant Eadon

      Bryant Eadon

      Chief Information Officer, StrongArm Technologies

  20. Push Security to the Edge: Overcoming Edge Computing Challenges

    The best attacks are the ones you never see coming

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

What’s hot on Infosecurity Magazine?