Infosecurity Opinions

  1. #HowTo: Measure the Performance of Your Cyber Team

    Effective team performance management is crucial if you are to drive improvements and keep hold of your top talent

    1. Photo of Thomas Mackenzie

      Thomas Mackenzie

      CEO, RankedRight

  2. How to Build and Retain Your Cybersecurity A-Team

    With the global cyber skills shortage, the task of identifying, recruiting and retaining talent is harder than ever

    1. Photo of Adam Burns

      Adam Burns

      Director of Cybersecurity, Digital Guardian

  3. Cyber-Attacks: Risk Transference as Crucial as Risk Prevention

    How businesses and startups should prepare for the increasing risk – and cost – of cyber-attacks

    1. Photo of Steve Prymas

      Steve Prymas

      Chief Information Officer at Embroker

  4. How Businesses Can Stay Ahead of the Christmas Rush

    How businesses can prepare for the spike of data privacy requests and avoid large GDPR fines and unhappy customers

    1. Photo of Gal Ringel

      Gal Ringel

      CEO & Co-founder of Mine for Business

  5. How Companies Will Eliminate Privacy Concerns With On-Premise Conversational AI

    We’re moving toward a faster, more convenient digital future, but privacy needs to remain a central concern

    1. Photo of Pavel Osokin

      Pavel Osokin

      Founder and CEO, AMAI

  6. 4 Reasons Why Christmas Is Peak Season for Cyber-Attacks

    Four reasons why and what you can do to protect yourself

    1. Photo of Stephen Crow

      Stephen Crow

      Head of Security & Compliance, UKFast

  7. AI-Powered Malware Doesn't Actually Exist

    Understanding what AI means and how attacks are performed allow you to shrug off fictitious ramblings

    1. Photo of Andrew Patel

      Andrew Patel

      Researcher, Artificial Intelligence Centre of Excellence, F-Secure

  8. Cyber Resiliency: Safeguarding Data for Business Continuity

    The pandemic has reshaped how we work, but the hybrid workforce amplifies cloud security concerns

    1. Photo of Stefan Liesche

      Stefan Liesche

      IBM Distinguished Engineer Cloud Hyper Protect Services, IBM Cloud

  9. Cybersecurity Innovations of the Past Decade: From Automated Penetration Testing to Quantum Computing

    While innovations are intended for good, hackers lie in wait to capitalize on them

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  10. CBD: Stress Reliever to Stress-Inducing Phishing Scam

    It only takes one careless click for hackers to gain access to a network

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  11. Insider Threats: Protecting from Within

    Why access, data and awareness are key to minimizing malicious insider threat risk

    1. Photo of Jon Ford

      Jon Ford

      Global Managing Director, Insider Threat Security Solutions, Mandiant

  12. #HowTo: Improve Security Awareness Training

    Improving security awareness is not just a case of increasing the number of initiatives; the existing programs also need to deliver results

    1. Photo of Oz Alashe

      Oz Alashe

      CEO, CybSafe

  13. Cybersecurity Risks Around Smart City Development

    Smart cities will happen, and the potential for assistive technologies is too tempting to ignore

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  14. Will Single Sign-on Ever Become Mainstream?

    For SSO to be mainstream, it's vital to maintain control of identities and user access levels

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  15. The Long and Short Roads to Security Maturity

    Why less mature organizations have a long and hazardous road to travel

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  16. #HowTo: Prevent Insider Threats in Your Organization

    What are the different types of insider threats, and how can they be prevented?

    1. Photo of Tom Eston

      Tom Eston

      AVP of consulting, Bishop Fox

  17. Crime-As-A-Service Is Leveling Up - And Businesses Aren't Prepared

    Crime-as-a-Service is helping cyber-criminals level up their attacks and target organizations with sophisticated tactics

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

  18. Mind the Gap: Moving from Missing Encryption to Ubiquitous Data Security

    How new software addresses the challenge of closing gaps and consolidating complexity into a single, invisible data platform

    1. Photo of Ayal Yogev

      Ayal Yogev

      CEO and Co-Founder, Anjuna Security

  19. Top 3 Mistakes Companies Make With Security and Compliance

    Avoid costly mistakes by establishing suitable systems and protocols to keep your compliance up to date

    1. Photo of Troy Fine

      Troy Fine

      Senior Manager, Drata

  20. Defending DNS Against DDoS Attacks to Protect Reputation, Revenue and Customers

    Why DNS is vulnerable and what companies can do to shore up defenses

    1. Photo of Ryan Davis

      Ryan Davis

      CISO, NS1

What’s Hot on Infosecurity Magazine?