Infosecurity Opinions

  1. How Long Before VPNs Are Mothballed?

    Why VPNs fail to address security challenges posed by enterprise mobility, BYOD, remote workers, cloud resources, third-party vendors and the network core

    1. Photo of Etay Maor

      Etay Maor

      Senior Director of Security Strategy, Cato Networks

  2. The Top 5 Cybersecurity Tools Companies Need to Implement Right Now

    The five cybersecurity tools companies must make sure to implement to lower their risk of being attacked

    1. Photo of Kurtis Minder

      Kurtis Minder

      Co-Founder and Chief Executive Officer, GroupSense

  3. DDoS Attacks Against Online Gamers and the Damaging Ripple Effect

    Why vulnerable and critical industries must further invest in cybersecurity

    1. Photo of Richard Hummel

      Richard Hummel

      ASERT Threat Intelligence Lead at NETSCOUT

  4. QR Security - Are You Ready?

    What are the security concerns surrounding QR codes, and how can these be mitigated?

    1. Photo of Zach Fleming

      Zach Fleming

      Principal Architect, Integrity360

  5. Cybersecurity for the Post-COVID Era

    IT teams need to rethink their cybersecurity strategies for the better

    1. Photo of Martin Riley

      Martin Riley

      Director of Managed Security Services, Bridewell

  6. #HowTo: Measure the Performance of Your Cyber Team

    Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent

    1. Photo of Thomas Mackenzie

      Thomas Mackenzie

      CEO, RankedRight

  7. How to Build and Retain Your Cybersecurity A-Team

    With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever

    1. Photo of Adam Burns

      Adam Burns

      Director of Cybersecurity, Digital Guardian

  8. Cyber-Attacks: Risk Transference as Crucial as Risk Prevention

    How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks

    1. Photo of Steve Prymas

      Steve Prymas

      Chief Information Officer at Embroker

  9. How Businesses Can Stay Ahead of the Christmas Rush

    How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers

    1. Photo of Gal Ringel

      Gal Ringel

      CEO & Co-founder of Mine for Business

  10. How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI

    We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern

    1. Photo of Pavel Osokin

      Pavel Osokin

      Founder and CEO, AMAI

  11. 4 Reasons Why Christmas Is Peak Season for Cyber-Attacks

    Four reasons why and what you can do to protect yourself

    1. Photo of Stephen Crow

      Stephen Crow

      Head of Security & Compliance, UKFast

  12. AI-Powered Malware Doesn't Actually Exist

    Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

    1. Photo of Andrew Patel

      Andrew Patel

      Researcher, Artificial Intelligence Centre of Excellence, F-Secure

  13. Cyber Resiliency: Safeguarding Data for Business Continuity

    The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

    1. Photo of Stefan Liesche

      Stefan Liesche

      IBM Distinguished Engineer Cloud Hyper Protect Services, IBM Cloud

  14. Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing

    While innovations are intended for good, hackers lie in wait to capitalize on them

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  15. CBD: Stress Reliever to Stress-Inducing Phishing Scam

    It only takes one careless click for hackers to gain access to a network

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  16. Insider Threats: Protecting from Within

    Why access, data and awareness are key to minimizing malicious insider threat risk

    1. Photo of Jon Ford

      Jon Ford

      Global Managing Director, Insider Threat Security Solutions, Mandiant

  17. #HowTo: Improve Security Awareness Training

    Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  18. Cybersecurity Risks Around Smart City Development

    Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  19. Will Single Sign-on Ever Become Mainstream?

    For SSO to be mainstream, it's vital to maintain control of identities and user access levels

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  20. The Long and Short Roads to Security Maturity

    Why less mature organizations have a long and hazardous road to travel

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

What’s Hot on Infosecurity Magazine?