Infosecurity Opinions

  1. #HowTo: Mitigate Cyber-Risks During Financial Milestones

    Cybersecurity needs to be fully integrated into a company's valuation ahead of IPOs, M&As, investments and other financial milestones

    1. Photo of Noy Saban

      Noy Saban

      CFO, CYE

  2. Cyber Vulnerabilities and Safety Risks Across the UK's Digital Railway

    How the rail industry can balance physical security and digital safety to keep the UK rail network secure

    1. Photo of Alex Cowan

      Alex Cowan

      Chief Executive Officer, RazorSecure

  3. Cybersecurity Pros Need a Seat at the Table

    It’s time to move from a business continuity mindset to a business agility mindset

    1. Photo of David Pignolet

      David Pignolet

      President and CEO, SecZetta

  4. The SEC Means Business: Clamping Down on Financial Institution Complacency with Security Practices

    Companies lacking effective policies or failing to follow through on them will see harsh enforcement actions

    1. Photo of Ari Buchler

      Ari Buchler

      Board Director at Simeio

  5. Why a Risk Reset Is Needed for a More Secure, Automated Cyber Future

    Why a risk reset is vital and why there's no better time than now to implement change

    1. Photo of Steve Benton

      Steve Benton

      CSO, BT Security

  6. Securing the Modern Software Supply Chain

    How developers can protect themselves and the wider developer community

    1. Photo of Liran Tal

      Liran Tal

      Director of Developer Advocacy, Snyk

  7. Why It's Time to Talk About Nation-State Attacks...Again

    Why threat intelligence must consider the wider geopolitical landscape more

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  8. How to Get Your Staff Onboard with Information Security

    Four ways employers can cultivate a security culture in their organization

    1. Photo of David Cripps

      David Cripps

      Chief Information Security Officer, Moneycorp

  9. Going Global: How the Russian Ransomware Model Could Spread Worldwide

    Will sanctions change the tactics of different ransomware groups?

    1. Photo of Allan Liska

      Allan Liska

      Senior Security Architect and Ransomware Specialist, Recorded Future

  10. Holiday Ready: How Retailers Can Prepare a Gift-Wrapped Availability and Security Framework During the Holiday Period

    Ensuring you withstand retail’s golden period will give you and your teams a silent night

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

  11. #HowTo: Ensure a Healthy and Ransomware-Proof Environment

    What are the best practices for protecting your business from ransomware attacks?

    1. Photo of Sergei Serdyuk

      Sergei Serdyuk

      vp of product management, NAKIVO

  12. The Password Turns 60 This Year, But It's Not Going Away Anytime Soon

    Too many networks, devices, systems and people rely on passwords for the tech to quickly vanish

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  13. What the FBI Hoax Blast Reveals About Email Deception

    Today’s security tools need to understand businesses communications, context and behaviors to combat sophisticated email attacks

    1. Photo of Marcus  Fowler

      Marcus Fowler

      Director of Strategic Threat, Darktrace

  14. 10 Essential Cybersecurity and Privacy Features Needed in Video Conferencing

    Organizations must look at their communications tools to ensure total organizational safety and security

    1. Photo of George Waller

      George Waller

      EVP and Co-Founder of StrikeForce Technologies

  15. How Cybersecurity Automation Can Boost Deal Value and Insights in M&A Due Diligence

    Through automation, organizations engaging in M&A can leverage the power of tech, data and intelligence

    1. Photo of Dave Harvey

      Dave Harvey

      Managing Director, FTI Consulting

    2. Photo of Laura Kippin

      Laura Kippin

      Senior Director, FTI Consulting

  16. #HowTo: Protect Customers Using the Latest Authentication Technologies

    Are technologies like behavioral biometrics the answer to rising privacy and security concerns?

    1. Photo of Amir Nooriala

      Amir Nooriala

      CCO, Callsign

  17. Getting Real About Cybersecurity: An Ounce of Cure May Be Worth a Pound of Prevention

    Why preparing to limit the damage of a breach protects our data, customers, employees and companies

    1. Photo of Jay Barbour

      Jay Barbour

      Director of Security Product Management at Masergy

  18. Protecting Against the Danger From Within: How Digital Forensics Can Identify Insider Threats

    Digital forensics will ensure that organizations are not powerless to respond

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  19. Is the Cybersecurity Skills Shortage Really a Resourcing Issue?

    With resources increasingly stretched, it's time to take advantage of automation, improve retention rates and build the IT team of the future

    1. Photo of Kevin Issac

      Kevin Issac

      SVP EMEA Sales, Sophos

  20. Adapting Your IT Service Desk for the Remote or Hybrid World

    With the shift towards hybrid work, infrastructure and operations leaders must adjust how they offer and deliver IT support

    1. Photo of Chris Matchett

      Chris Matchett

      Senior Research Director, Gartner

What’s Hot on Infosecurity Magazine?