Infosecurity Opinions

  1. Cybersecurity Vulnerabilities: The Race to Patch

    Organizations should question whether they have the resources to continuously monitor and triage third-party cyber risk

    1. Photo of Robert Hannigan

      Robert Hannigan

      Chairman, International Business - BlueVoyant

  2. Five Myths About Cybercrime and Cybersecurity

    It is essential to bust common myths about cybercrime

    1. Photo of David Steele

      David Steele

      MD & principal security consultant, SecuriCentrix

  3. #HowTo: Enhance Data Security and Privacy

    Prevention strategies and strong incident response plans will enable resilience and reduce the overall business impact of a breach

    1. Photo of Gráinne Bryan

      Gráinne Bryan

      senior managing director, FTI Consulting

    2. Photo of Nina Bryant

      Nina Bryant

      Managing Director, FTI Consulting

    3. Photo of Dave Harvey

      Dave Harvey

      Managing Director, FTI Consulting

  4. #HowTo: Prove Identity Security ROI to Boards as a CISO

    CISOs must learn how to persuade the board to invest in cybersecurity

    1. Photo of Damir Brescic

      Damir Brescic

      cybersecurity executive advisor and strategic partner, Authomize

  5. How Geopolitical Tension Creates Opportunities for Cyber-Criminals

    DDoS attacks are increasingly being incorporated into the arsenal for geopolitical protests and warfare

    1. Photo of Philippe Alcoy

      Philippe Alcoy

      APAC security technologies, NETSCOUT

  6. #HowTo: Secure Your Kubernetes Environments

    Kubernetes security needs to extend well beyond pre-deployment to encompass the environment in runtime

    1. Photo of James Brown

      James Brown

      senior vice president, customer success, Lacework

  7. #HowTo: Approach IoMT Security and Risk Management

    Healthcare security teams face unique challenges in protecting IoT devices

    1. Photo of Constancio Fernandes

      Constancio Fernandes

      VP of engineering, Asimily

  8. Are We Doing Enough to Protect Our NHS?

    Five years on from the WannaCry ransomware attack that hit the UK's NHS, is the organization's cybersecurity posture sufficient?

    1. Photo of James Cunningham

      James Cunningham

      CEO and co-founder, Core to Cloud

  9. #HowTo: Find the Right SOC Provider

    Organizations need to find a partner who goes beyond the typical managed SOC commercial relationship

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  10. UX Design is Key to Creating Privacy Controls that Unlock Value 

    It’s vital to provide clear journeys for customers to choose how their data is used

    1. Photo of Elizabeth Garside

      Elizabeth Garside

      customer experience expert, PA Consulting

    2. Photo of Elisabeth Mackay

      Elisabeth Mackay

      privacy and cyber security expert, PA Consulting

  11. #HowTo: Stay Cyber-Secure This Summer

    Chris Harris offers safe practices holiday-goers should follow this summer

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  12. #HowTo: Overcome Burnout in Cybersecurity Teams

    Defending against the rapidly expanding threat landscape is a strenuous task for any SecOps team and burnout is a real risk

    1. Photo of Fabien Rech

      Fabien Rech

      VP EMEA, Trellix

  13. The Needle is Shifting on Post-Quantum Security – Here’s What You Need to Know

    Businesses now have the tools they need to begin thinking about migrating to new post-quantum standards

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  14. HowTo: Level Up MSPs’ Cybersecurity

    MSPs that monitor, deploy and respond will be a step ahead of their competitors

    1. Photo of Gregg Lalle

      Gregg Lalle

      SVP International Sales, ConnectWise

  15. Is There a Weak Link in Your Supply Chain?

    The supply chain is only secure when all entities carry out effective, coordinated security measures

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  16. #HowTo: Plug Data Leaks

    While companies are faced with more risks, taking a proactive approach is key to stopping a data leak from causing a major incident

    1. Photo of Todd Carroll

      Todd Carroll

      CISO, CybelAngel

  17. Applying Infosecurity Principles and Practices to Cognitive Security

    How many of the concepts and TTPs developed in cybersecurity can be applied to CogSec

    1. Photo of Max Lesser

      Max Lesser

      Volunteer, DISARM

    2. Photo of SJ Terp

      SJ Terp

      Chief Scientist, DISARM

  18. Is Open Source the Greatest Path to Security?

    Open source offers real security benefits to organizations, but also carries significant risks

    1. Photo of Darren  Prehaye

      Darren Prehaye

      senior solutions architect, Digital Catapult

  19. How Humans Can Positively Interact with Technology

    Technology has been developing rapidly but society has struggled to keep up. People now find themselves exploited

    1. Photo of Marie Oldfield

      Marie Oldfield

      Director, Oldfield Consultancy

  20. #HowTo: Demystify the NIST Cybersecurity Framework

    The NIST Cybersecurity Framework can be confusing for newcomers to understand. This article offers an easily digestible primer for the guidelines

    1. Photo of Cam Roberson

      Cam Roberson

      vice president, Beachhead Solutions

What’s Hot on Infosecurity Magazine?