Infosecurity Opinions

  1. #HowTo: Evaluate Your Cyber Insurance

    Businesses must identify truly comprehensive cyber-insurance coverage for risk prevention

    1. Photo of Michael Carr

      Michael Carr

      Head of Risk Engineering, US & Canada, Coalition

  2. The New Amateur Hackers: How Professional Hackers Are Enabling a New Wave of Novices

    This new democratization of hacking tools means that no business is safe

    1. Photo of Matthew Gracey-McMinn

      Matthew Gracey-McMinn

      Head of Threat Research

  3. Tackling Misconceptions of Mobile-Based Authentication

    The importance of the security and ease-of-use credentials of mobile-based one-time passcodes

    1. Photo of Nic Sarginson

      Nic Sarginson

      Principal Solutions Engineer, Yubico

  4. Why Zero Trust is the Best Defence for our Digital Food Supply Chain

    A zero trust, best-practice approach is key to protecting critical food supply infrastructure

    1. Photo of James Sinton

      James Sinton

      Technology Platform Manager of IMS Evolve

  5. The Future of Cloud-Native in a Brave New World

    How IT teams can utilize the full benefits of cloud-native while significantly lowering the risk

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

  6. Smart City Development Is Pushing Video Surveillance to the Cloud

    Shifting surveillance to the cloud requires increased access to crucial real-time data

    1. Photo of David Friend

      David Friend

      CEO and Co-Founder, Wasabi Technologies

  7. #HowTo: Quickly Evaluate a SaaS Vendor’s Cloud Security

    It usually takes less than 10 minutes to score a company’s security based on their public information

    1. Photo of Patrick Walsh

      Patrick Walsh

      CEO, IronCore Labs

  8. GDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors

    Several tips for SaaS companies to navigate the updated regulations

    1. Photo of Christeene  Alcosiba

      Christeene Alcosiba

      Senior product manager and ERG leader at Salesloft

    2. Photo of Vicki Reyzelman

      Vicki Reyzelman

      Director of Product Management at Salesloft

  9. Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

    Three identity security practices that are fundamental to the success of a zero trust strategy

    1. Photo of Eric Anderson

      Eric Anderson

      Enterprise Security, Adobe

  10. Measuring Cybersecurity Effectiveness Is the Only Way to Know if You Are Protected

    Real cyber resilience can only come with the measuring of onboard vessel systems’ levels of protection

    1. Photo of Avital Sincai

      Avital Sincai

      COO at Cydome

  11. Stop Purchasing, Start Developing: Why Hiring for Tech in 2022 Will Look Very Different

    Why cyber reskilling and upskilling are key to keeping organizations safe

    1. Photo of Graham Hunter

      Graham Hunter

      VP of Skills, CompTIA

  12. Defense Against the Dark Arts: Learnings From the Magical World to Boost Your AppSec

    How businesses can guard against the threat actors who are cursing, jinxing and charming their way past security defenses

    1. Photo of Erez Yalon

      Erez Yalon

      Head of Security Research, Checkmarx

  13. Why Politically Motivated Cyber-Attacks Are a Threat to Democracy

    Why governments and political parties must work harder to better understand and safeguard their assets

    1. Photo of Brendan Kotze

      Brendan Kotze

      Chief Technology Officer and Co-founder, Performanta

  14. #HowTo: Automate Your Security Processes

    To make the most of automation, it’s important to adopt a holistic approach to your processes and people

    1. Photo of Girish Bhat

      Girish Bhat

      vice president, security, Sumo Logic

  15. Protecting Supply Chains from Highly Contagious Attacks

    Why it's vital to understand why supply chain attacks are so frequent and how they cause large-scale destruction

    1. Photo of Amy Nelson

      Amy Nelson

      Chair of PC Client Work Group, Trusted Computing Group

  16. Why Holistic Ecosystems Will Be Central to Future Cybersecurity

    Businesses require an approach comprising both technological and human components

    1. Photo of Helena Nimmo

      Helena Nimmo

      CIO, Endava

  17. The Colonial Pipeline Attack Eight Months On

    Why asset operators need to begin shaping their security programs to protect their most critical assets

    1. Photo of Sachin Shah

      Sachin Shah

      CTO for OT/ICS

  18. Cybersecurity Trends for 2022

    Cybersecurity needs to remain at the front of mind in 2022 as companies look to build on the measures they put in place in 2021

    1. Photo of Cate Pye

      Cate Pye

      Partner, PA Consulting, PA Consulting

  19. Protecting the Most Crucial Software Supply Chain Targets

    How today’s attackers take advantage of software supply chain weaknesses

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  20. #HowTo: Solve Your Organization’s Password Woes

    CISOs must perform a careful balancing act – protecting their organization’s systems while not overly inconveniencing or disrupting employees

    1. Photo of Wes Wright

      Wes Wright

      Chief Healthcare Officer, Ordr

What’s Hot on Infosecurity Magazine?