Infosecurity Opinions

  1. #HowTo: Defend Against Rising Application Layer Attacks

    Advances in applications have introduced a number of new often overlooked, security vulnerabilities

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  2. Make Employees Part of the Security Solution

    Organizations should build employee training within overall security solutions

    1. Photo of Lior Kohavi

      Lior Kohavi

      Chief Strategy Officer and EVP for Advanced Solutions, Cyren

  3. Reducing Cookie Walls and Banners Post-Brexit: There Must Be a Better Way

    Are proposed legislative changes in regard to cookies really necessary?

    1. Photo of Richard Hancock

      Richard Hancock

      data protection officer, GlobalSign

  4. How Ground-Breaking is WhatsApp's Fine?

    Every privacy policy needs careful thought and reflects the company’s actual data processing

    1. Photo of Alexander  Egerton

      Alexander Egerton

      Partner and privacy compliance officer at Seddons

  5. How To Improve Patch Management

    Why it's vital to creat a patching cycle that continuously updates your inventory, manages priorities and delivers updates

    1. Photo of Paul Baird

      Paul Baird

      Chief technical security officer, Qualys

  6. Hospital Security Teams: Are the Odds Stacked Against Them?

    Hospital executives need to invest the resources necessary to ensure the safety of their patients

    1. Photo of Azi Cohen

      Azi Cohen

      CEO, CyberMDX

  7. Cybersecurity 2021: Where Are We Moving Into Q4?

    Why strong digital countermeasures, application allow-listing and endpoint encryption are gaining traction

    1. Photo of Jerry Ray

      Jerry Ray

      COO, SecureAge

  8. Race Against Time: Why a Robust Application Security Posture is Essential

    Application and security teams need to improve their synergy to protect organizations from data breaches

    1. Photo of Gregg Ostrowski

      Gregg Ostrowski

      Regional CTO, Cisco AppDynamics

  9. #HowTo: Make You and Your Departments More Digitally Secure

    Organizations only need to do the simplest things to protect their data

    1. Photo of Sam Johnstone

      Sam Johnstone

      CMO, BookingLive

  10. Ransomware is Harming Cybersecurity Strategy: What Can Organizations Do?

    Smarter use of technology can protect organizations from ransomware attacks

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  11. Why Are Industrial Control System Attacks Increasing?

    The answer lies in the convergence of OT and IT, exposing industrial environments with outdated technologies to the internet

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  12. President Biden Has Opened the Door to Zero Trust - Will Boris Johnson Follow Suit?

    Is it time for the UK government to endorse zero trust?

    1. Photo of Tony Scott

      Tony Scott

      former federal CIO for the Obama Administration; board member, ColorTokens

  13. Avoiding the Achilles Heel of Non-European Cybersecurity

    Should organizations choose a local provider in regard to their data security?

    1. Photo of John Vestberg

      John Vestberg

      CEO, Clavister

  14. #HowTo: Secure Distributed Infrastructures

    There are six areas critical to protecting distributed infrastructures

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  15. Securing the Network of the Future for Remote Work

    As remote work surges, it is vital organizations enhance their network security

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  16. Rethinking Security When Identity is the Ultimate Attack Surface

    The pandemic-induced accelerated digital transformation has seen new hybrid working models disrupting how identities are managed

    1. Photo of Craig Ramsay

      Craig Ramsay

      presales consultant, Omada

  17. Make or Break: What To Do When Security Solutions Fail

    Why a strong business continuity strategy built around the concept of zero trust is essential

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  18. UK's General Data Protection Regulation (GDPR) Explained

    Why there's a duty to protect the personal data of companies like Total Fitness under the UK's iteration of GDPR

    1. Photo of Jack Dunn

      Jack Dunn

      Associate, Bryan Cave Leighton Paisner

    2. Photo of Geraldine Scali

      Geraldine Scali

      Partner, Bryan Cave Leighton Paisner

  19. GSaaS: The Changing Dynamics of Cybersecurity

    GSaaS will shape the future of organizations' data security

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  20. Why AI and Automation Provide Superhuman Security

    While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

What’s hot on Infosecurity Magazine?