Infosecurity Opinions

  1. European Commission Acknowledges the Evolving Threat Landscape

    Cyber-attacks are rarely isolated, and success on one front will spur assaults on many more

    1. Photo of Carlos Morales

      Carlos Morales

      SVP, Solutions, Neustar

  2. Protecting the Three Dimensions of the Data Lifecycle

    To better protect sensitive data, it’s helpful to think about it in the multiple dimensions of the lifecycle

    1. Photo of Shashi Kiran

      Shashi Kiran

      CMO, Fortanix

  3. Solving the Gen-N Security Dilemma

    The behaviors of Gen-N may inadvertently open up an organization to a myriad of security risks

    1. Photo of Simon  Wilson

      Simon Wilson

      CTO, UK and Ireland, Aruba Networks

  4. #HowTo: Eradicate Plaintext Data Breaches

    Organizations that encrypt everything can protect sensitive information even in the event of a data leak

    1. Photo of Shane Curran

      Shane Curran

      founder and CEO, Evervault

  5. #HowTo: Protect Your Organization From the Increasing Threat of Ransomware

    Organizations need to implement stronger cyber-defenses to tackle threat of ransomware

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  6. Actions Stations, Someone? There Aren't Enough Specialists to Man Security Tools

    Organizations need to find a way to capture the real value of their tools and metrics

    1. Photo of Brian  Foster

      Brian Foster

      Chief Product Officer, ReliaQuest

  7. Compete to Communicate on Cybersecurity

    As tech firms compete to offer software at lowest prices, communications around cybersecurity should be an imperative

    1. Photo of Steve  Weber

      Steve Weber

      Professor of the Graduate School, School of Information, UC Berkeley

  8. The New Era of Cyber-Attacks - Who is Most at Risk This Year?

    Cyber-attacks are constantly evolving, and so are the actual targets of these attacks

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  9. #HowTo: Launch a Remote Incident Response

    Remote working has changed how incident response teams are able to respond to security incidents

    1. Photo of Joani Green

      Joani Green

      global head of incident response, WithSecure

  10. What the War in Ukraine Means

    The war in Ukraine has ramifications, including widespread use of crypto and Russia gaining unfettered access to source code

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

  11. Preparation Includes Understanding Your Battlefield

    Nations should review their cybersecurity strategies now so their actions aren’t merely reactionary

    1. Photo of Kenneth Holley

      Kenneth Holley

      CEO, Silent Quadrant

    2. Photo of Mary Yang

      Mary Yang

      Chief Marketing Officer, LookingGlass Cyber

  12. Why Relying on AI for Automated Detection and Response is Dangerous

    Only a human and machine collaboration enables companies to conduct simpler, faster and more accurate security investigations

    1. Photo of Dhiraj Sharan

      Dhiraj Sharan

      Founder and CEO of Query.AI

  13. The Rising Threat of Apps in the World of SaaS Platforms

    While marketplaces for third-party apps on platforms like Zoom and Slack expand, security solutions aren't keeping up

    1. Photo of Misha Seltzer

      Misha Seltzer

      Co-founder and CTO, Atmosec

  14. #HowTo: Keep the Benefits of Zero Trust

    A flexible zero trust-based approach is crucial as cyber-attacks rise

    1. Photo of Russ Kirby

      Russ Kirby

      CISO, ForgeRock

  15. Will FIDO Replace OTP Multi-Factor Authentication?

    Organizations should implement authentication schemes that offer better security and login experience

    1. Photo of Danna Bethlehem

      Danna Bethlehem

      Director Product Marketing, Access Management & Authentication, Thales

  16. #WorldPasswordDay: 9 Reasons to Adopt a Corporate Password Manager

    How password managers help you better control your credentials and mitigate risks

    1. Photo of Alexandre Cagnoni

      Alexandre Cagnoni

      director of authentication, WatchGuard Technologies

  17. Why Is the UN Collecting the Biometric Data of Ukrainian Refugees?

    The knee-jerk reaction to using biometrics in a country where it is gratuitous is concerning

    1. Photo of Tiara Ataii

      Tiara Ataii

      Freelancer Writer

  18. #HowTo: Solve the Machine Identity Crisis

    With damaging breaches becoming common from increased machine identity environment complexity, companies must act now

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi, a CyberArk Company

  19. Cloud Migration is in Full Swing: How to Achieve Security at Every Stage of Adoption

    A cloudy future looms: CISOs must act now

    1. Photo of Dor Levy

      Dor Levy

      Director of Security, Reposify

  20. Security for 5G and the Intelligent Edge

    A lone employee can’t watch for all potential attacks, so automated software is needed

    1. Photo of Barbara Cosgriff

      Barbara Cosgriff

      Principal Technologist, Intelligent System Security, Wind River

What’s Hot on Infosecurity Magazine?