Infosecurity Opinions

  1. Defending Against State-Sponsored Hackers

    No one is safe, and professionals need to think about their risk management strategy

    1. Photo of Chris Kennedy

      Chris Kennedy

      CISO and VP of customer success at AttackIQ

  2. Is Anyone Paying Attention to Healthcare Security?

    How much worse does it need to get for us to begin acting responsibly?

    1. Photo of Safi Oranski

      Safi Oranski

      VP of Business Development at CyberMDX

  3. Why Leaky Clouds Lead to Data Breaches

    We’re bound to see more of these breaches in the future even though they’re easy to avoid

    1. Photo of Dean Sysman

      Dean Sysman

      CEO and co-founder, Axonius

  4. 2020 – An Opportunity in Counterintelligence and Deception

    Deception helps address the two primary barriers to breach protection

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  5. Managing the Public Cloud in 2020

    The public cloud is crucial for modern organizations looking to digitally transform their business, yet security in that area remains a hurdle

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  6. Are You Prepared to Battle Account Takeover Fraud?

    Security measures that will help you assess your capacity to battle account takeover fraud.

    1. Oliver Smith

      Tech Writer, Shufti Pro

  7. Common Cloud, Container and Control Mistakes to Avoid in 2020

    Three common – and critical – mistakes made by CISOs and CSOs.

    1. Photo of Sean Lutner

      Sean Lutner

      Infrastructure architect, Edgewise Networks

  8. Why Private DNA Testing is a Threat to Our Privacy

    Existing regulations are not enough to fully protect a person’s genetic data

    1. Photo of Dean Chester

      Dean Chester

      CEO and Cyber Expert, CoolTechZone

  9. With Third-Party Providers, Trust is in Short Supply

    Innovation, therefore, increasingly necessitates outsourcing.

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  10. The Five States of Compliance Maturity: Building a Strong Training Strategy

    A comprehensive training strategy can result in major, long-term dividends.

    1. Photo of Andy Nickolls

      Andy Nickolls

      Senior Director of Compliance EMEA at Skillsoft

  11. #HowTo Deal with Apple Ransomware

    In contrast to a widespread misconception, Mac computers are susceptible to ransomware and other types of predatory code

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  12. Code Signing: How to Respond to the Hidden Threat

    How do you know the code you’re using can be trusted?

    1. Photo of Eddie Glenn

      Eddie Glenn

      Senior Product Manager, Venafi

  13. Weaponized Data Breaches: Fueling a Global Cyber Cold War

    Escalating geo-political tensions are intensifying the global cyber cold war with no end in sight

    1. Photo of Monica Pal

      Monica Pal

      CEO, 4iQ

  14. New Year, New Operating System

    The truth is migrating to a new operating system can be a pain

    1. Photo of Andy Baldin

      Andy Baldin

      VP EMEA, Ivanti

  15. Options to End the End to End Encryption Debate

    The debate has been framed as being between privacy and security

    1. Photo of Dawn Alford

      Dawn Alford

      Journalist and Broadcaster

  16. How eLearning Can Increase Company Cybersecurity Across the Board

    Its better to be proactive rather than reactive

  17. The Risk of Increase in Social Cyber Security in 2020

    One way social proof can drive positive cybersecurity behaviors is by highlighting the right that others are doing.

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  18. DevOps and Security – What’s in a Name?

    By looking at a DevOps Security approach rather than DevSecOps, security teams can use their influence and experience to their advantage

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  19. Preparing Your Enterprise For a Post-Quantum Future

    There is no easy way to know if you are behind the curve, on schedule, or moving too slowly

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  20. Knowing Your Enemy: Attack Attribution in Cybersecurity

    While you can’t predict all attacks, you can use intelligence from the past to mitigate

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

What’s Hot on Infosecurity Magazine?