Infosecurity Opinions

  1. #HowTo: Build The Right Skills to Become a CISO

    To become a CISO, you need a wide range of skills

    1. Photo of George Gerchow

      George Gerchow

      CSO, Sumo Logic

  2. Investigate and Recover From Ransomware Attacks With Digital Forensics

    How organizations can use digital forensics to assess damage, stop the spread and facilitate recovery

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  3. Defending Against Cyber-Threats – Think Like an Attacker

    As UK businesses face increased risk of a cyber-attack, here are steps they need to take to lessen the threat

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  4. Why It's a Great Time to Be a Mobile Threat

    As mobile devices become more important, hackers are seizing on a vulnerable blindspot in the enterprise attack surface

    1. Photo of Ashish Patel

      Ashish Patel

      General Manager - EMEA, Zimperium

  5. Securing Enterprise Data While Enabling Remote Working

    How we can take measures to reduce our exposure to attacks and avoid being exploited

    1. Photo of Nathan Turajski

      Nathan Turajski

      Senior Director, Informatica

  6. #IWD2022: Women in Cybersecurity: Why We Need to Inspire the Younger Generation

    Is enough being done to close the gender gap and encourage women to join an industry?

    1. Photo of Kirsten Scott

      Kirsten Scott

      Account Director, Code Red Security PR Network

  7. A Critical Component of a Layered Approach to Cybersecurity: SIEMaaS

    Embracing a layered approach to cybersecurity will give your organization an edge in the fight against cyber-threats

    1. Photo of Sean Martin

      Sean Martin

      Director of Product Strategy, CSI Business Solutions

  8. Cameras, Video Analytics and Legislation: Top Video Privacy Trends of 2022

    Legislation worldwide needs to keep evolving while still allowing companies to innovate.

    1. Photo of Simon Randall

      Simon Randall

      Founder and CEO of Pimloc

  9. #HowTo: Prepare for the Future of Electronic Identities

    Not everyone is prepared to take the leap and there is still some hesitancy around eID

    1. Photo of Michael Magrath

      Michael Magrath

      vice president, global regulations and standards, OneSpan

  10. Deep Learning: It's Not Too Good to Be True - It's Genuine Progress

    When something seems too good to be true, it usually is, but not when it comes to deep learning

    1. Photo of Brooks Wallace

      Brooks Wallace

      VP EMEA, Deep Instinct

  11. 2022 Cybersecurity Forecast: The Threat Landscape & Protecting Your Organization

    With a commitment to zero trust and supply chain reporting, public and private organizations will reduce the number of incidents

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iboss

  12. #HowTo: Solve the UK's Shortage of Cybersecurity Experts

    What are the potential solutions to the UK's lack of cybersecurity professionals?

    1. Photo of Sarah-Jane McQueen

      Sarah-Jane McQueen

      general manager, CoursesOnline

  13. How to Build an Autonomic Security Operations Center (SOC)

    A guide to transforming a SOC’s scale, visibility and automation

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  14. #HowTo: Introduce Advanced Technologies into Your Security Strategy

    Advanced technologies are crucial to combatting modern cyber-threats, but how can they be integrated into your organization?

    1. Photo of Alexander Ivanyuk

      Alexander Ivanyuk

      Senior Director of Product and Technology Positioning, Acronis

  15. Criminal Cryptocurrency Transactions Will Drop by 30% by 2024 - Here's Why

    Avivah Litan, VP research analyst at Gartner, outlines the four key developments why this drop will happen

    1. Photo of Avivah Litan

      Avivah Litan

      Distinguished VP Research Analyst, Gartner

  16. Why Diversity Is Crucial to Bringing Cybersecurity Recruitment Into the 21st Century

    How businesses should re-evaluate their hiring criteria, and how the current industry talent gaps can be navigated

    1. Photo of Ian McShane

      Ian McShane

      Field CTO, Arctic Wolf Networks

  17. Cyber-War Exclusion Clauses in Cyber Insurance

    Why business leaders can no longer rely on insurers to bail them out when hit by ransomware

    1. Photo of Peter Groucutt

      Peter Groucutt

      Managing Director at Databarracks

  18. Why A Fundamental Change in Cybersecurity Is Required

    As people’s lives become more linked to the digital realm, now is the time to move forward with digital safety

    1. Photo of John Goodacre

      John Goodacre

      Director of UKRI's Digital Security by Design

  19. Quantum Encryption: The Basics

    We’re on the verge of a state of 'quantum security' for everyone

    1. Photo of Denis Mandich

      Denis Mandich

      CTO and Co-Founder of Qrypt

  20. #HowTo: Meet the Cyber Jobs Challenge

    Technology solutions that leverage automation, context and the skills your team are key to addressing the cyber skills gap

    1. Photo of Allen McNaughton

      Allen McNaughton

      director of systems engineering, Infoblox

What’s hot on Infosecurity Magazine?