Infosecurity Opinions

  1. #HowTo: Plug Data Leaks

    While companies are faced with more risks, taking a proactive approach is key to stopping a data leak from causing a major incident

    1. Photo of Todd Carroll

      Todd Carroll

      CISO, CybelAngel

  2. Applying Infosecurity Principles and Practices to Cognitive Security

    How many of the concepts and TTPs developed in cybersecurity can be applied to CogSec

    1. Photo of Max Lesser

      Max Lesser

      Volunteer, DISARM

    2. Photo of SJ Terp

      SJ Terp

      Chief Scientist, DISARM

  3. Is Open Source the Greatest Path to Security?

    Open source offers real security benefits to organizations, but also carries significant risks

    1. Photo of Darren  Prehaye

      Darren Prehaye

      senior solutions architect, Digital Catapult

  4. How Humans Can Positively Interact with Technology

    Technology has been developing rapidly but society has struggled to keep up. People now find themselves exploited

    1. Photo of Marie Oldfield

      Marie Oldfield

      Director, Oldfield Consultancy

  5. #HowTo: Demystify the NIST Cybersecurity Framework

    The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines

    1. Photo of Cam Roberson

      Cam Roberson

      vice president, Beachhead Solutions

  6. How to Keep Your CMS Safe and Secure

    Unless properly secured, a CMS can open the door to bad operators

    1. Photo of Sebastian Gierlinger

      Sebastian Gierlinger

      VP of developer experience, Storyblok

  7. Only More Secure Coding Can Protect the Software Supply Chain

    How developers can build more secure coding and increase industry awareness of the issue

    1. Photo of Elad Leon

      Elad Leon

      Senior CTI expert, CYE

  8. California's Child Privacy Protections Could Be Thorn in Stalkerware's Side

    California's attempt to better protect children’s privacy could represent an entirely separate cyber-threat

    1. Photo of David Ruiz

      David Ruiz

      Senior Threat Content Writer, Malwarebytes

  9. Why the Password Is Not Dead

    Why passwords are here to stay as the core of personal digital security

    1. Photo of Craig Lurey

      Craig Lurey

      CTO and Co-Founder, Keeper Security

  10. European Commission Acknowledges the Evolving Threat Landscape

    Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more

    1. Photo of Carlos Morales

      Carlos Morales

      SVP, Solutions, Neustar

  11. #HowTo: Build Awareness and Best Practices into Your Company and Development Culture

    How can organizations change security from a defensive tax model to an offensive mode?

    1. Photo of Jenn Reed

      Jenn Reed

      CISO, Aviatrix

  12. Protecting the Three Dimensions of the Data Lifecycle

    To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle

    1. Photo of Shashi Kiran

      Shashi Kiran

      CMO, Fortanix

  13. Solving the Gen-N Security Dilemma

    The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks

    1. Photo of Simon  Wilson

      Simon Wilson

      CTO, UK and Ireland, Aruba Networks

  14. #HowTo: Eradicate Plaintext Data Breaches

    Organizations that encrypt everything can protect sensitive information even in the event of a data leak

    1. Photo of Shane Curran

      Shane Curran

      founder and CEO, Evervault

  15. #HowTo: Protect Your Organization From the Increasing Threat of Ransomware

    Organizations need to implement stronger cyber-defenses to tackle threat of ransomware

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  16. Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools

    Organizations need to find a way to capture the real value of their tools and metrics

    1. Photo of Brian  Foster

      Brian Foster

      Chief Product Officer, ReliaQuest

  17. Compete to Communicate on Cybersecurity

    As tech firms compete to offer software at lowest prices, communications around cybersecurity should be an imperative

    1. Photo of Steve  Weber

      Steve Weber

      Professor of the Graduate School, School of Information, UC Berkeley

  18. The New Era of Cyber-Attacks - Who is Most at Risk This Year?

    Cyber-attacks are constantly evolving, and so are the actual targets of these attacks

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  19. #HowTo: Launch a Remote Incident Response

    Remote working has changed how incident response teams are able to respond to security incidents

    1. Photo of Joani Green

      Joani Green

      global head of incident response, WithSecure

  20. What the War in Ukraine Means

    The war in Ukraine has ramifications, including widespread use of crypto and Russia gaining unfettered access to source code

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

What’s Hot on Infosecurity Magazine?