Infosecurity Opinions

  1. Schools Out for Ransom: Education Under Attack

    Cyberis' Matt Lorentzen details the unique cybersecurity challenges facing the education sector

    1. Photo of Matt  Lorentzen

      Matt Lorentzen

      Principal Consultant, Cyberis

  2. SMBs Should Increase Cybersecurity Investment Despite the Economy

    Cyber-criminals see a recession as an opportunity to attack companies at their weakest, meaning SMBs can't afford to reduce investment in security

    1. Photo of Dror Liwer

      Dror Liwer

      co-founder, Coro

  3. The Security Challenge of Open Source Software

    A more collaborative approach to security is needed to ensure open source is secure in the future

    1. Photo of Amanda  Brock

      Amanda Brock

      CEO, OpenUK

  4. #HowTo: Protect Healthcare Providers' Data

    Pharma companies must offer robust data security and privacy in their marketing practices today

    1. Photo of Michelle Teuscher

      Michelle Teuscher

      life sciences industry principal, Treasure Data

  5. Is Insurance the Solution to, or the Enabler of, Ransomware?

    The data held by insurance companies can improve organizations' defenses against ransomware attacks

    1. Photo of Martin Lee

      Martin Lee

      technical lead of security research, Cisco Talos

  6. Taking the Attacker View to Protect the Growing Attack Surface

    The preventive and response strategy of security teams is in dire need of revaluation in the post-pandemic threat landscape

    1. Photo of Gurucharan Raghunathan

      Gurucharan Raghunathan

      senior product manager, Microsoft

  7. Are we Losing the War Against Ransomware?

    Changing approaches to ransomware, such as RaaS and the development of new tools, are making this vector more dangerous to organizations

    1. Photo of Tim Wallen

      Tim Wallen

      regional director, UKI & BeNeLux, Logpoint

  8. #HowTo: Fight Back Against Ransomware Attacks

    Alex Hinchliffe shares a 10-point plan for organizations to fight back against ransomware attacks

    1. Photo of Alex Hinchliffe

      Alex Hinchliffe

      threat intelligence analyst, Unit 42, Palo Alto Networks

  9. #DataPrivacyWeek: Data Privacy Breeds Trust – Here’s Why

    Russell Howe explains how respecting your customers data choices can have big commercial benefits

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  10. Software Developers Will Be Key to Security in 2023

    Peter Danhieux outlines how organizations can enhance security in the software development process

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  11. #HowTo: Protect Your Business From Human Error-Related Cybersecurity Breaches

    Ben Herzberg highlights the key steps organizations must take to protect themselves from the vast number of breaches that happen due to human error

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  12. Security Breaches Are Inevitable, Not Illimitable

    Organizations that proactively prepare for a breach before its occurrence can execute successful damage control

    1. Photo of Andy Norton

      Andy Norton

      European Cyber Risk Officer, Armis

  13. How Vendor Complexity Increases the Costs of Cybersecurity

    Growing integration of security products is creating more complexities for security teams

    1. Photo of Mark Logan

      Mark Logan

      CEO, One Identity

  14. Let's Normalize 'Radical Transparency' Around Data Breaches

    Dr Niklas Helleman highlights the benefits of a total transparency approach to dealing with cyber-attacks

  15. #HowTo: Bolster Infrastructure as Code Security

    Mitigating code-level issues requires organizations to factor security into engineering processes

    1. Photo of Michael  Isbitski

      Michael Isbitski

      director of cybersecurity strategy

  16. Why Cybersecurity Learning and Development is a Lifeline During Economic Downturn

    The dual crisis of recession and a widening skills gap is not one that companies can hire their way out of

    1. Photo of Alexia Pedersen

      Alexia Pedersen

      VP of EMEA, O'Reilly

  17. Using a Risk-Based Approach to Cyber Recruitment

    Businesses should focus their recruitment strategies and concentrate on retaining their existing staff through career development programs

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  18. #HowTo: Collaborate Without Sharing Data

    Access to the right data should not be the limiting factor to finding solutions and accelerating innovation

    1. Photo of Robin Roehm

      Robin Roehm

      CEO and co-founder, Apheris

  19. How False Positives Burn Security Teams Out

    Vulnerability scanning is a crucial part of identifying application security weaknesses, but come with false positives

    1. Photo of Karl Gonzi

      Karl Gonzi

      general manager, Malta, Invicti Security

  20. Cyber Insurance: A Must Have, Not a Nice to Have

    Cyber insurance is becoming a requirement to demonstrate a business's preparedness in mitigating attacks

    1. Photo of Mark Warren

      Mark Warren

      product specialist, Osirium

What’s hot on Infosecurity Magazine?