Infosecurity Opinions

  1. #HowTo: Secure On-Chain Data

    Despite advancements in blockchain security, we currently live in an awkward time with a high experimentation factor and few security options

    1. Photo of David Schwed

      David Schwed

      COO, Halborn

  2. Cyber-Attacks on UK Councils – Why They Happen and What We Can Do About it

    UK Councils have become a major target for cyber-criminals, and action must be taken to protect these bodies

    1. Photo of Jamie Akhtar

      Jamie Akhtar

      CEO and co-founder, CyberSmart

  3. ‘Last Call’ to Prepare for Two US Privacy Laws

    With only weeks remaining, organizations must ensure they are ready to comply with two US privacy laws going into effect on January 1, 2023

    1. Photo of Scott Allendevaux

      Scott Allendevaux

      Cyberlaw and Policy Analyst, CISSP, HCISPP, CIPP/US, CIPT, CIPM

  4. HowTo: Fight Cyber-Threats in the Metaverse

    Now is the time to invest in training the architects of the Metaverse to navigate its security threats

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  5. Tech Addiction and Work Burnout Make us Prone to Phishing Attacks

    Confronting the issues related to tech addiction will help your organization combat the potential of cyber-attacks

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  6. #HowTo: Build Trust in Your Software Through Insights

    Organizations can benefit from learning from the experiences of peers to improve their software security

    1. Photo of Frank Morris

      Frank Morris

      managing director EMEA & APAC, Synopsys

  7. Cybersecurity Awareness: An Open Letter to CISOs

    Now is the time to focus on long-term behavioral change rather than cybersecurity awareness, says Oz Alashe

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  8. How DDoS Disrupts Live Events

    DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event

  9. #HowTo: Secure Your Cloud Migration

    Organizations must take action to strengthen its security posture amid cloud migration

    1. Photo of David Richardson

      David Richardson

      VP, product, Lookout Inc

  10. What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

    Researchers have observed 10,666 ransomware variations in the past six months

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  11. Cyberwar is Changing – is Your Organization Ready?

    Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare

    1. Photo of Conor Coughlan

      Conor Coughlan

      CMO and Advocacy Officer, Armis

  12. #HowTo: Build Trust Between Developers and Security Teams

    To make software more secure, we must overcome cultural differences between developers and security teams

    1. Photo of Altaz Valani

      Altaz Valani

      director, insights research, Security Compass

  13. Implementing Connected Place Cybersecurity Principles

    What are the challenges authorities face when adopting the NCSC Cyber Security Principles?

    1. Photo of Martin Walsham

      Martin Walsham

      director, AMR CyberSecurity

  14. #CyberMonth: A Time to Change Behaviors

    KnowBe4 security experts share their experiences of helping change people's behaviors

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  15. #HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks

    Recent attacks on the public sector show these organizations need to be hyper-focused on protecting themselves

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  16. Cyber Skills Shortage is Caused by Analyst Burnout

    We have to work smarter and treat current industry professionals better to solve the cyber skills shortage

    1. Photo of Matt Lawrence

      Matt Lawrence

      head of defensive security, JUMPSEC

  17. #HowTo: Prepare for the Worst in Cybersecurity

    Under new regulations, financial services organizations and their suppliers need to prepare for when (not if) a cyber-attack happens

    1. Photo of Adam  Stringer

      Adam Stringer

      Partner & Head of Cyber, Privacy & Operational Resilience in Financial Services, PA Consulting

  18. #CyberMonth: Staying Cyber Secure in an Increasingly Hostile Digital Environment

    Organizations can do more to ensure teams are more cyber-aware this Cybersecurity Awareness Month

    1. Photo of Andy Bates

      Andy Bates

      practice director - security, Node4

  19. #HowTo: Get an Attacker’s Eye View of Your Security

    Mimicking an attacker’s eye view of your network will complement your existing traditional approach to security

    1. Photo of Paul Baird

      Paul Baird

      Chief technical security officer, Qualys

  20. #CyberMonth: What Every Employer Needs to Know About Passwords

    Passwords remain key, and organizations must take steps to ensure they are as secure as possible

    1. Photo of Itay Saraf

      Itay Saraf

      cyber security expert, CYE

    2. Photo of Max Shlochiski

      Max Shlochiski

      cyber security expert, CYE

What’s Hot on Infosecurity Magazine?