Infosecurity Opinions

  1. HowTo: Protect Software by Understanding Your Environment

    Software is a big target for cyber-criminals, and organizations must understand their environment to secure it

    1. Photo of Girish Janardhanudu

      Girish Janardhanudu

      vice president, security consulting, Synopsys

  2. Data Security Best-Practice in a World of Evolving Risks and Regulations

    Organizations with a uniform approach to data management and access control can increase their security and compliance

    1. Photo of Sophie Stalla-Bourdillon

      Sophie Stalla-Bourdillon

      senior privacy counsel and legal engineer, Immuta

  3. How Website Tracking Technologies Are Transforming Risk Analysis Across Industries

    The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology

    1. Photo of Lauren Winchester

      Lauren Winchester

      SVP of Risk + Response, Corvus Insurance

  4. #HowTo: Reduce Risk and Complexity in Cloud Networks

    John Moran discusses how security to move from inhibitor to enabler to organizations multi-cloud strategies

    1. Photo of John Moran

      John Moran

      Technical Director, Business Development, Tufin

  5. Why Security Pros Need to Escape the Cyber Bubble

    The cybersecurity community agrees on so much, but why do we still argue over the same things?

    1. Photo of Mike Thompson

      Mike Thompson

      Information Security Manager - Zen Internet

  6. The Anatomy of an Insider Threat

    People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism

    1. Photo of Tim De Sousa

      Tim De Sousa

      Senior Director, FTI Consulting

    2. Photo of Kevin Hughes

      Kevin Hughes

      Senior Director, FTI Consulting

  7. Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities

    Satellites provide critical services, meaning cyber-attacks can cause widespread disruption

    1. Photo of Douglas McKee

      Douglas McKee

      principal engineer & director of vulnerability research, Trellix

  8. #HowTo: Reduce Cyber Risks Amid Surging Threats

    Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape

    1. Photo of Terry Olaes

      Terry Olaes

      senior technical director, Skybox Security

  9. The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape

    Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats

    1. Photo of Camellia Chan

      Camellia Chan

      CEO and founder, X-PHY, a Flexxon brand

  10. Taking a Different Approach to Tackle the Cyber Skills Gap

    Cyber professionals continue to walk in search of higher pay and better working conditions, so what can the business do to improve retention?

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  11. #HowTo: Secure AI and its Software Supply Chains

    Dan Conn discusses what needs to be done to secure AI and its software supply chains

    1. Photo of Dan Conn

      Dan Conn

      Developer Advocate, Sonatype

  12. Make Secure-by-Design Possible at University and Beyond

    Amy Baker discusses how secure coding training can become integrated both in college and industry

    1. Photo of Amy Baker

      Amy Baker

      security education evangelist, Security Journey

What’s hot on Infosecurity Magazine?