Infosecurity Opinions

  1. Why Cybersecurity Learning and Development is a Lifeline During Economic Downturn

    The dual crisis of recession and a widening skills gap is not one that companies can hire their way out of

    1. Photo of Alexia Pedersen

      Alexia Pedersen

      VP of EMEA, O'Reilly

  2. Using a Risk-Based Approach to Cyber Recruitment

    Businesses should focus their recruitment strategies and concentrate on retaining their existing staff through career development programs

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  3. #HowTo: Collaborate Without Sharing Data

    Access to the right data should not be the limiting factor to finding solutions and accelerating innovation

    1. Photo of Robin Roehm

      Robin Roehm

      CEO and co-founder, Apheris

  4. How False Positives Burn Security Teams Out

    Vulnerability scanning is a crucial part of identifying application security weaknesses, but come with false positives

    1. Photo of Karl Gonzi

      Karl Gonzi

      general manager, Malta, Invicti Security

  5. Cyber Insurance: A Must Have, Not a Nice to Have

    Cyber insurance is becoming a requirement to demonstrate a business's preparedness in mitigating attacks

    1. Photo of Mark Warren

      Mark Warren

      product specialist, Osirium

  6. Weaponizing the Law in the Fight Against Cyber-Criminals

    The EU is working on two major pieces of cybersecurity legislation that organizations must be aware of

    1. Photo of Jakub Lewandowski

      Jakub Lewandowski

      global data governance officer, Commvault

  7. The Importance of Cyber Resilience in the Communications Sector

    Attacks on the communications sector represent one of the most severe cyber threats any nation can face

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  8. #HowTo: Manage ‘Dark Data’ in Organizations

    Amid a backdrop of increasing data compliance regulations, organizations cannot turn a blind eye to lingering dark data

    1. Photo of Dan Neault

      Dan Neault

      SVP & general manager, data security, Imperva

  9. Why KPIs Are Critical to Effective Security

    Organizations can use KPIs to measure cybersecurity effectiveness and align it with the wider goals of the business

    1. Photo of Jason Hart

      Jason Hart

      CTO EMEA, Rapid7

  10. Cybersecurity is a Team Sport – Avoid the ‘Us and Them’ Culture

    A positive security culture needs to come from the top down, and involve everyone in the organization

    1. Photo of Darek Hahn

      Darek Hahn

      client experience operations director, Cerberus Sentinel

  11. #HowTo: Solve the Cybersecurity Skills Gap in the Banking Sector

    Providing cybersecurity training to existing employees can fill the security skills gap in banking

    1. Photo of Joost Heins

      Joost Heins

      vice president of global business insights, Randstad Sourceright

  12. Defending Against the Expanding as-a-Service Threat Landscape

    The growth of criminal as-a-service offerings will increase the threat volume and require new defensive strategies

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  13. What Makes the FIFA World Cup a Prime Target for Cyber-Criminals?

    Sporting events like the FIFA world cups are a tempting target for DDoS attackers

    1. Photo of Richard Hummel

      Richard Hummel

      ASERT Threat Intelligence Lead at NETSCOUT

  14. Tackling the Scourge of Advertising Fraud

    Cybersecurity teams need to work in parallel with marketers to lessen the impact made by ad fraud

    1. Photo of Adam French

      Adam French

      regional vice president (EMEA), TrafficGuard

  15. #HowTo: Strengthen Supply Chain Security

    Eilon Elhadad identifies three key areas we should focus on to strengthen supply chain security

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  16. How to Mitigate the Cyber Risks of Energy Blackouts

    Potential energy blackouts this winter could cause cyber risks for organizations if they aren't prepared

    1. Photo of Scott Goodwin

      Scott Goodwin

      COO and co-founder, DigitalXRAID

  17. Beyond Google: The Real Problem with Data Privacy

    We need to accelerate the adoption of new technologies, protocols and standards that prioritize the control of data by eliminating silos and copies

    1. Photo of Chris McLellan

      Chris McLellan

      director of operations, Data Collaboration Alliance

  18. #HowTo: Make Security a Board Level Discussion

    Creating a collective approach to cybersecurity starts from the top down, says Microsoft's Sarah Armstrong-Smith

    1. Photo of Sarah Armstrong-Smith

      Sarah Armstrong-Smith

      Chief Security Advisor, Microsoft

  19. Turning Data into Evidence to Accelerate SecOps Success

    Contextual understanding of data is crucial to enhance network defenders' detection and response capabilities

    1. Photo of Jean Schaffer

      Jean Schaffer

      CTO, Corelight

  20. Moving Away From a ‘Checklist’ Approach to Federal Compliance in Cloud Security

    The way organizations implement federal cloud security frameworks determines the risk and therefore effectiveness of the controls

    1. Photo of Krishna C. Tata

      Krishna C. Tata

      manager - security risk and architecture, Cisco

What’s Hot on Infosecurity Magazine?