Infosecurity Opinions

  1. Should we Make Ransomware Payments Illegal?

    With Australia contemplating a ban on ransomware payments, Will Dixon questions whether this will be a wise move

    1. Photo of Will Dixon

      Will Dixon

      global head of the Academy and Community, ISTARI

  2. Why Organizations Should Not Rely on the New EU US Privacy Framework in the Long-Term

    Roberts & Obradovic Law Group discuss the risks of relying on the new EU US Privacy Framework for data transfers

    1. The Roberts & Obradovic Team

      Roberts * Obradovic

  3. Cybersecurity Burnout – Human vs Machine

    Current ways of working in cybersecurity have become outdated and unsustainable, creating a volatile operational cocktail

    1. Photo of Brian Martin

      Brian Martin

      head of product, strategy and innovation, Integrity360

  4. #HowTo: Update Software Securely

    David Higgins from CyberArk highlights five best practices to follow when updating software as part of a wider defense-in-depth strategy

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  5. CISA’s Recognition of Security Control Validation is a Major Milestone

    CISA recently issued an alert advising organizations to validate security control effectiveness

    1. Photo of Dr Suleyman Ozarslan

      Dr Suleyman Ozarslan

      Co-founder, Picus Security

  6. Will CMMC 2.0 Prove a Help or Hindrance to Defense Contractors?

    The US federal government has created a simplified and more flexible version of the CMMC model, but will it have the desired impact in reality?

    1. Photo of Matthew  Hodson

      Matthew Hodson

      CIO, Valeo Networks

  7. Why Keeping Your Gaming Console Secure Should be a Priority in 2023

    With gaming cyber threats on the rise, Jasson Casey, sets out steps gamers can take to improve their online security

    1. Photo of Jasson Casey

      Jasson Casey

      chief technology officer, Beyond Identity

  8. #HowTo: Maximize Security ROI Amid an Economic Downturn

    By incorporating automation, security teams can demonstrate program value to leadership, reduce costs and bring transformational change to the business

    1. Photo of Cody Cornell

      Cody Cornell

      chief strategy officer, Swimlane

  9. Schools Out for Ransom: Education Under Attack

    Cyberis' Matt Lorentzen details the unique cybersecurity challenges facing the education sector

    1. Photo of Matt  Lorentzen

      Matt Lorentzen

      Principal Consultant, Cyberis

  10. SMBs Should Increase Cybersecurity Investment Despite the Economy

    Cyber-criminals see a recession as an opportunity to attack companies at their weakest, meaning SMBs can't afford to reduce investment in security

    1. Photo of Dror Liwer

      Dror Liwer

      co-founder, Coro

  11. The Security Challenge of Open Source Software

    A more collaborative approach to security is needed to ensure open source is secure in the future

    1. Photo of Amanda  Brock

      Amanda Brock

      CEO, OpenUK

  12. #HowTo: Protect Healthcare Providers' Data

    Pharma companies must offer robust data security and privacy in their marketing practices today

    1. Photo of Michelle Teuscher

      Michelle Teuscher

      life sciences industry principal, Treasure Data

  13. Is Insurance the Solution to, or the Enabler of, Ransomware?

    The data held by insurance companies can improve organizations' defenses against ransomware attacks

    1. Photo of Martin Lee

      Martin Lee

      technical lead of security research, Cisco Talos

  14. Taking the Attacker View to Protect the Growing Attack Surface

    The preventive and response strategy of security teams is in dire need of revaluation in the post-pandemic threat landscape

    1. Photo of Gurucharan Raghunathan

      Gurucharan Raghunathan

      senior product manager, Microsoft

  15. Are we Losing the War Against Ransomware?

    Changing approaches to ransomware, such as RaaS and the development of new tools, are making this vector more dangerous to organizations

    1. Photo of Tim Wallen

      Tim Wallen

      regional director, UKI & BeNeLux, Logpoint

  16. #HowTo: Fight Back Against Ransomware Attacks

    Alex Hinchliffe shares a 10-point plan for organizations to fight back against ransomware attacks

    1. Photo of Alex Hinchliffe

      Alex Hinchliffe

      threat intelligence analyst, Unit 42, Palo Alto Networks

  17. #DataPrivacyWeek: Data Privacy Breeds Trust – Here’s Why

    Russell Howe explains how respecting your customers data choices can have big commercial benefits

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  18. Software Developers Will Be Key to Security in 2023

    Peter Danhieux outlines how organizations can enhance security in the software development process

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  19. #HowTo: Protect Your Business From Human Error-Related Cybersecurity Breaches

    Ben Herzberg highlights the key steps organizations must take to protect themselves from the vast number of breaches that happen due to human error

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  20. Security Breaches Are Inevitable, Not Illimitable

    Organizations that proactively prepare for a breach before its occurrence can execute successful damage control

    1. Photo of Andy Norton

      Andy Norton

      European Cyber Risk Officer, Armis

What’s hot on Infosecurity Magazine?