Infosecurity Opinions

  1. #HowTo: Protect Customers Using the Latest Authentication Technologies

    Are technologies like behavioral biometrics the answer to rising privacy and security concerns?

    1. Photo of Amir Nooriala

      Amir Nooriala

      CCO, Callsign

  2. Getting Real About Cybersecurity: An Ounce of Cure May Be Worth a Pound of Prevention

    Why preparing to limit the damage of a breach protects our data, customers, employees and companies

    1. Photo of Jay Barbour

      Jay Barbour

      Director of Security Product Management at Masergy

  3. Protecting Against the Danger From Within: How Digital Forensics Can Identify Insider Threats

    Digital forensics will ensure that organizations are not powerless to respond

    1. Photo of Adam Belsher

      Adam Belsher

      CEO of Magnet Forensics

  4. Is the Cybersecurity Skills Shortage Really a Resourcing Issue?

    With resources increasingly stretched, it's time to take advantage of automation, improve retention rates and build the IT team of the future

    1. Photo of Kevin Issac

      Kevin Issac

      SVP EMEA Sales, Sophos

  5. Adapting Your IT Service Desk for the Remote or Hybrid World

    With the shift towards hybrid work, infrastructure and operations leaders must adjust how they offer and deliver IT support

    1. Photo of Chris Matchett

      Chris Matchett

      Senior Research Director, Gartner

  6. In Advance of the Metaverse, We Need to Fix Some Pressing Problems With Our Current Digital Civilization

    We require legal ground rules to ensure the metaverse operates in a trustworthy manner

    1. Photo of George S. Takach

      George S. Takach

      Senior Partner at McCarthy-Tétrault

  7. The Facebook Outage and the Case for Cyber-Resilience

    Why cyber-resilience can address outages regardless of cause

    1. Photo of Patricia Muoio

      Patricia Muoio

      General Partner at SineWave Ventures

  8. Decoding Biden's Push for Zero Trust: Why Should the Indian Government Adopt It?

    Biden's effort towards a transformational security model provides a future-ready, cloud-ready, remote-ready cyber policy

    1. Photo of Sandip Kumar  Panda

      Sandip Kumar Panda

      CEO and Co-Founder of Instasafe Technologies

  9. The Evolution of Ransomware Extortion Schemes

    As ransomware groups evolve, organizations cannot risk falling behind and exposing their assets

    1. Photo of Alexander Applegate

      Alexander Applegate

      Senior Threat Researcher, ZeroFOX

  10. 3 Questions Answered About Confidential Computing

    With confidential computing organizations will find creative and useful ways to put their data to work

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  11. Ransomware Hogs the Spotlight, but It's Not the Only Malware to Watch Out For

    Malvertising and scareware are on the rise, injecting their evil plans into your employees' networks

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  12. #HowTo: Protect Critical Infrastructure from Cyber-Criminals

    Given today’s cyber-threat landscape, critical infrastructure enterprises should be looking to adopt increasingly flexible and varied security solutions

    1. Photo of Mo Cashman

      Mo Cashman

      enterprise security architect and principal engineer, McAfee

  13. Security and Compliance Risks Associated With the Merger and Acquisition Process

    Mergers and acquisitions provide new processes and technologies that can mitigate risks

    1. Photo of Verity Chinnery

      Verity Chinnery

      Senior Director of GRC Implementations, SureCloud

  14. The 5 Golden Rules of Cyber-War

    Cyberspace is now the 5th domain of warfare recognized by NATO alongside land, air, sea and space

    1. Photo of Erwan Keraudy

      Erwan Keraudy

      CEO, CybelAngel

  15. Modern Challenges in Securing Multi-Cloud Environments

    Why cloud security best practices will continue to evolve as organizations better understand the environment

    1. Photo of Tim Erlin

      Tim Erlin

      VP of Product Management and Strategy, Tripwire

  16. Data Protection When Cyber-Attacks Are Rife

    How organizations and employees can stay one step ahead of the rapidly evolving threats

    1. Photo of Patrick Harr

      Patrick Harr

      CEO, SlashNext

  17. The Privilege Is Mine: Protecting Endpoints From Compromised Credentials

    Why staying on top of endpoints will strengthen security defenses and keep sensitive data safe

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  18. 3 Key Reasons Zero Trust Network Access is Critical for Today's Mobile Worker

    Networks have to be secure, but that security shouldn’t prevent innovation and forward movement in business

    1. Photo of Aaron Kiemele

      Aaron Kiemele

      Chief Information Security Officer, Jamf

  19. Phishing Is an Insider Risk - It's Time to Tackle It Like One

    Employees are your last line of defense from phishing – empower them, and you can turn them into your biggest strength

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

What’s Hot on Infosecurity Magazine?