Infosecurity Opinions

  1. #HowTo: Protect Your Company From Magecart Attacks

    As Magecart attacks surge amid increased e-commerce transactions, investing in web application security has never been more important

    1. Photo of Hadar Blutrich

      Hadar Blutrich

      CTO, Source Defense

  2. Redefining Ransomware – Why Confronting Cybercrime Starts With a War of Words

    Ransomware has a clear definition and one that, in a world of growing digital complexity, matters

    1. Photo of Charl van der Walt

      Charl van der Walt

      Head of Security Research, Orange Cyberdefense

  3. National Cybersecurity Strategies Are Under Pressure and Innovation Remains Key to Protection

    How prioritizing the latest tech innovations will remain a key focus for many months to come

    1. Photo of Danny Lopez

      Danny Lopez

      CEO, Glasswall Solutions

  4. Are Protection Payments the Future of Ransomware?

    Ransomware gangs are persistent, innovative and playing a long-term game – defenders must do the same!

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  5. #HowTo: Create a More Diverse Cybersecurity Team

    Diversifying the talent pipeline will expand the talent pipeline and help build a healthier cybersecurity culture

    1. Photo of Lisa Jones-Huff

      Lisa Jones-Huff

      senior director, head of global security specialist team, Elasticsearch Ltd

  6. The 'Silver Lining' to Ransomware Attacks on Businesses in an Increasingly Hostile World

    The resilience gained from past attacks should be seen as a silver lining in the face of graver dangers

    1. Photo of Elad Sherf

      Elad Sherf

      Global Head of Cyber Defence, Performanta

  7. Know Your Ransomware Enemy: Getting Inside the Mind of a Hacker

    Faced with the reality that it’s no longer a case of if, but when attackers strike, IT teams face a mission-critical task

    1. Photo of Andy Fernandez

      Andy Fernandez

      Senior Manager - Product Marketing, Zerto

  8. 5 Levers Lawmakers Can Use to Tackle Cybercrime

    The ISF's cybersecurity framework allows policymakers, legislators and law enforcement agencies to better grasp the dynamics behind cybercrime

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  9. Supply Chain Attacks Are Increasing – Organizations Must Evolve

    The old ways of protecting your most valuable assets aren’t working anymore, and it’s time to evolve

    1. Photo of Patrick Tickle

      Patrick Tickle

      CEO, SecureLink

  10. How Automated Offboarding Can Keep Your SaaS Stack Safe

    Offboarding doesn't end when users have been disabled or removed from active directory or IAM

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  11. #HowTo: Effectively Manage and Secure APIs

    API security needs to be seen as a critical dimension of a data security strategy

    1. Photo of Lebin Cheng

      Lebin Cheng

      Director of API Security, Imperva

  12. The Best Defense Is a Good Offense: How to Beat Ransomware

    Why the conversation around ransomware needs to focus earlier on the attack chain

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  13. How to Begin Proactive Threat Hunting

    The four key success factors of proactive threat hunting are VIMP – visibility, intelligence, machine learning and people

    1. Photo of Henry  Hon

      Henry Hon

      Manager (Cyber Defense), KPMG

  14. #HowTo: Get Cyber Essentials Certified

    January 2022 saw significant changes to the Cyber Essentials certification, and organizations need to act to implement them

    1. Photo of Karl Alderton

      Karl Alderton

      technical account manager, Qualys

  15. WFH - A Remote Prospect for Infosec Professionals?

    Hybrid working seems set to become the norm but will security professionals be excluded given the nature of their role?

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  16. Ransomware Through the Supply Chain: Are Organizations Prepared for the New Normal?

    Why it’s imperative organizations know where they fall in the supply chain to defend against attacks

    1. Photo of Ryan Kovar

      Ryan Kovar

      Distinguished Security Strategist and Leader of SURGe, Splunk

  17. Light at the End of the Ransomware Tunnel?

    Insurance demands, state sanctions and reporting requirements will lead to the evolution of a new type of threat that only cyber resilience can meet.

    1. Photo of James Blake

      James Blake

      Field CISO, Rubrik

  18. Never-Mind the Gap: It Isn't Skills We're Short Of, It's Common Sense

    To solve the cyber skills shortage, enterprises must invest in future professionals, look at existing ssets and ensure they use the right tools

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  19. Top 3 Ways Hackers Get Into Your Supplier's Network to Launch a Supply Chain Attack

    From launching phishing attacks to taking advantage of negligent employees

    1. Photo of Jonathan Wood

      Jonathan Wood

      CEO, C2 Cyber

  20. Why the Cybersecurity Industry Needs to Change Its Siloed Perception

    Why the cybersecurity industry needs to correct the evident gender disparity

    1. Photo of Heather Hinton

      Heather Hinton

      Chief Information Security Officer, RingCentral

What’s hot on Infosecurity Magazine?