Infosecurity Opinions

  1. Preparation Includes Understanding Your Battlefield

    Nations should review their cybersecurity strategies now so their actions aren’t merely reactionary

    1. Photo of Kenneth Holley

      Kenneth Holley

      CEO, Silent Quadrant

    2. Photo of Mary Yang

      Mary Yang

      Chief Marketing Officer, LookingGlass Cyber

  2. Why Relying on AI for Automated Detection and Response is Dangerous

    Only a human and machine collaboration enables companies to conduct simpler, faster and more accurate security investigations

    1. Photo of Dhiraj Sharan

      Dhiraj Sharan

      Founder and CEO of Query.AI

  3. The Rising Threat of Apps in the World of SaaS Platforms

    While marketplaces for third-party apps on platforms like Zoom and Slack expand, security solutions aren't keeping up

    1. Photo of Misha Seltzer

      Misha Seltzer

      Co-founder and CTO, Atmosec

  4. #HowTo: Keep the Benefits of Zero Trust

    A flexible zero trust-based approach is crucial as cyber-attacks rise

    1. Photo of Russ Kirby

      Russ Kirby

      CISO, ForgeRock

  5. Will FIDO Replace OTP Multi-Factor Authentication?

    Organizations should implement authentication schemes that offer better security and login experience

    1. Photo of Danna Bethlehem

      Danna Bethlehem

      Director Product Marketing, Access Management & Authentication, Thales

  6. #WorldPasswordDay: 9 Reasons to Adopt a Corporate Password Manager

    How password managers help you better control your credentials and mitigate risks

    1. Photo of Alexandre Cagnoni

      Alexandre Cagnoni

      director of authentication, WatchGuard Technologies

  7. Why Is the UN Collecting the Biometric Data of Ukrainian Refugees?

    The knee-jerk reaction to using biometrics in a country where it is gratuitous is concerning

    1. Photo of Tiara Ataii

      Tiara Ataii

      Freelancer Writer

  8. #HowTo: Solve the Machine Identity Crisis

    With damaging breaches becoming common from increased machine identity environment complexity, companies must act now

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi, a CyberArk Company

  9. Cloud Migration is in Full Swing: How to Achieve Security at Every Stage of Adoption

    A cloudy future looms: CISOs must act now

    1. Photo of Dor Levy

      Dor Levy

      Director of Security, Reposify

  10. Security for 5G and the Intelligent Edge

    A lone employee can’t watch for all potential attacks, so automated software is needed

    1. Photo of Barbara Cosgriff

      Barbara Cosgriff

      Principal Technologist, Intelligent System Security, Wind River

  11. Why No-Code Automation is the Future of SecOps

    How your team can maximize its benefits

    1. Photo of Eoin Hinchy

      Eoin Hinchy

      Cofounder and CEO, Tines

  12. Why It's Time to Stop Putting off Zero Trust

    As organizations bolster business resilience and enhance cyber maturity, here’s what they need to know

    1. Photo of PJ Kirner

      PJ Kirner

      CTO, Illumio

  13. What Does a 5G Cyber-Attack Look Like?

    5G signals a huge change in the way we manage connected infrastructure

    1. Photo of Tim Hardwick

      Tim Hardwick

      Managed Solutions & Consulting Lead, EMEA, Spirent

  14. Knowledge Sharing: Breaking Down Real-World Attacks to Learn for the Future

    When we balance the knowns and unknowns, we stand the best chance of winning not just the battle but the war

    1. Photo of Len Noe

      Len Noe

      Technical Evangelist/Whitehat Hacker, CyberArk

  15. Demand for Cybersecurity Skills Rises as Quantum Computing Threats Tighten

    As quantum computing becomes commercially available, the cybersecurity workforce must increase to meet demand

    1. Photo of Nils Gerhardt

      Nils Gerhardt

      Chief Technology Officer, Utimaco

  16. Digging Into the Science of Behaviour to Tackle Cyber Extortion

    When building a strategy to tackle cyber extortion, it is crucial to remember the complexity of human behavior

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  17. #HowTo: Create a Cyber Maturity Strategy

    Cyber maturity has become a crucial component in enabling revenue growth and product innovation as part of a holistic digital business strategy

    1. Photo of Maninder Singh

      Maninder Singh

      Corporate Vice President and Global Head of Cybersecurity & GRC Services, HCL Technologies

  18. Resilient Futures: A Blueprint for Securing Society in 2022 and Beyond

    How vendors, policymakers and technical agencies can deal with the menace of cybercrime

    1. Photo of Rodrigo Jazinski

      Rodrigo Jazinski

      CTO, CyberSmart

    2. Photo of Sam Soares

      Sam Soares

      Chief Growth Officer, CyberSmart

  19. Why Mobile Protection Is a Critical Piece of Your Security Puzzle

    Why IT teams must take certain measures to protect employee mobile devices

    1. Photo of Chester Wisniewski

      Chester Wisniewski

      Principal Research Scientist, Sophos

  20. Ransomcloud: Ransomware's Latest Manifestation Targets the Cloud

    With companies transferring digital assets to the cloud, cyber-criminals are leveraging ‘ransomcloud’ attacks

    1. Photo of Scott Orton

      Scott Orton

      Senior Cloud Security Consultant at Adarma

What’s Hot on Infosecurity Magazine?