Infosecurity Opinions

  1. The Cyber-Threat in 2022: Where You Keep Your Data Will Make or Break the Success of an Attack

    Why recent work environment transitions increase the opportunities for cyber-criminals to infiltrate businesses

    1. Photo of Laurance Dine

      Laurance Dine

      Global Partner, X-Force Incident Response, IBM

  2. Knowing What's Best: Breach Prevention or Breach Mitigation?

    Data breaches are accelerating in 2022, and your business could be next

    1. Photo of Trevor Morgan

      Trevor Morgan

      Product Manager at comforte AG

  3. Log4j Showed Us That Public Disclosure Still Helps Attackers

    Why we must ensure we put more robust disclosure processes in place

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  4. #HowTo: Stay on Top of Cyber-Hygiene

    Cyber-hygiene might not be the most exciting security topic, but it’s the most important

    1. Photo of Nik Whitfield

      Nik Whitfield

      chairman and founder, Panaseer

  5. The Cybersecurity Issues We Can't Ignore in 2022

    Why the metaverse will create new cybersecurity vulnerabilities

    1. Photo of Matias  Madou

      Matias Madou

      CTO & Co-founder, Secure Code Warrior

  6. #HowTo: Implement Continuous Compliance for Kubernetes

    What do organizations have to do to maintain compliance with Kubernetes?

    1. Photo of Glen  Kosaka

      Glen Kosaka

      head of product security, SUSE

  7. A Look Back at an Unprecedented Year in Ransomware

    A look back at ransomware through 2021 and how communications tactics have evolved

    1. Photo of Allie Bohan

      Allie Bohan

      Senior Consultant, FTI Consulting

    2. Photo of Orla Cox

      Orla Cox

      Director, FTI Consulting

    3. Photo of Jack Rozier

      Jack Rozier

      Senior Consultant, FTI Consulting

  8. #DataPrivacyWeek: The Rise of Ransomware and the Evolving Threat Landscape

    The most effective way to establish a line of defense against ransomware

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  9. Team Talk - Making Sense of Simulated Attack Exercises

    Whatever we choose to call it, the need for adversary-simulated attacks is only going to increase

    1. Photo of Owen  Wright

      Owen Wright

      Managing Director at Context, part of Accenture

  10. #DataPrivacyDay: Key GDPR Compliance Issues to Watch in the Artificial Intelligence Space

    Growing use of AI in business operations triggers privacy and security challenges requiring thoughtful consideration

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Anna Pateraki

      Anna Pateraki

      Associate, Hunton Andrews Kurth LLP

  11. How Automation Can Mitigate the Cybersecurity Skills Gap

    1. Photo of Arun Subbarao

      Arun Subbarao

      Vice President, Engineering and Technology, at Lynx

  12. Why the Assure Scheme Is Still Getting off the Ground in the Aviation Sector

    Why the new ASSURE cybersecurity scheme is experiencing teething problems

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  13. #DataPrivacyWeek: Data Privacy vs. Visibility: The Security Consideration

    How organizations can ensure the security of their IoT and cloud environments with deep data observability

    1. Photo of Adrian Rowley

      Adrian Rowley

      Senior Director, Gigamon

  14. Identity Theft Will Get Worse

    Why organizations need to enhance their approach to identity verification

    1. Photo of James Mirfin

      James Mirfin

      Global Head of Digital Identity & Fraud Solutions at Refinitiv

  15. #DataPrivacyWeek: The Best Kept Secrets About Data Privacy

    Why innovation in data privacy can improve value for businesses and consumers alike

    1. Photo of Shira Landau

      Shira Landau

      Content Marketing Manager, Check Point Software Technologies

  16. #HowTo: Evaluate Your Cyber Insurance

    Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention

    1. Photo of Michael Carr

      Michael Carr

      Head of Risk Engineering, US & Canada, Coalition

  17. The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

    This new democratization of hacking tools means that no business is safe

    1. Photo of Matthew Gracey-McMinn

      Matthew Gracey-McMinn

      Head of Threat Research

  18. Tackling Misconceptions of Mobile-Based Authentication

    The importance of the security and ease-of-use credentials of mobile-based one-time passcodes

    1. Photo of Nic Sarginson

      Nic Sarginson

      Principal Solutions Engineer, Yubico

  19. Why Zero Trust is the Best Defence for our Digital Food Supply Chain

    A zero trust, best-practice approach is key to protecting critical food supply infrastructure

    1. Photo of James Sinton

      James Sinton

      Technology Platform Manager of IMS Evolve

What’s hot on Infosecurity Magazine?