Infosecurity Opinions

  1. In Advance of the Metaverse, We Need to Fix Some Pressing Problems With Our Current Digital Civilization

    We require legal ground rules to ensure the metaverse operates in a trustworthy manner

    1. Photo of George S. Takach

      George S. Takach

      Senior Partner at McCarthy-Tétrault

  2. The Facebook Outage and the Case for Cyber-Resilience

    Why cyber-resilience can address outages regardless of cause

    1. Photo of Patricia Muoio

      Patricia Muoio

      General Partner at SineWave Ventures

  3. Decoding Biden's Push for Zero Trust: Why Should the Indian Government Adopt It?

    Biden's effort towards a transformational security model provides a future-ready, cloud-ready, remote-ready cyber policy

    1. Photo of Sandip Kumar  Panda

      Sandip Kumar Panda

      CEO and Co-Founder of Instasafe Technologies

  4. The Evolution of Ransomware Extortion Schemes

    As ransomware groups evolve, organizations cannot risk falling behind and exposing their assets

    1. Photo of Alexander Applegate

      Alexander Applegate

      Senior Threat Researcher, ZeroFOX

  5. 3 Questions Answered About Confidential Computing

    With confidential computing organizations will find creative and useful ways to put their data to work

    1. Photo of Ambuj Kumar

      Ambuj Kumar

      Fortanix co-founder and CEO

  6. Ransomware Hogs the Spotlight, but It's Not the Only Malware to Watch Out For

    Malvertising and scareware are on the rise, injecting their evil plans into your employees' networks

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  7. #HowTo: Protect Critical Infrastructure from Cyber-Criminals

    Given today’s cyber-threat landscape, critical infrastructure enterprises should be looking to adopt increasingly flexible and varied security solutions

    1. Photo of Mo Cashman

      Mo Cashman

      enterprise security architect and principal engineer, McAfee

  8. Security and Compliance Risks Associated With the Merger and Acquisition Process

    Mergers and acquisitions provide new processes and technologies that can mitigate risks

    1. Photo of Verity Chinnery

      Verity Chinnery

      Senior Director of GRC Implementations, SureCloud

  9. The 5 Golden Rules of Cyber-War

    Cyberspace is now the 5th domain of warfare recognized by NATO alongside land, air, sea and space

    1. Photo of Erwan Keraudy

      Erwan Keraudy

      CEO, CybelAngel

  10. Modern Challenges in Securing Multi-Cloud Environments

    Why cloud security best practices will continue to evolve as organizations better understand the environment

    1. Photo of Tim Erlin

      Tim Erlin

      VP of Product Management and Strategy, Tripwire

  11. Data Protection When Cyber-Attacks Are Rife

    How organizations and employees can stay one step ahead of the rapidly evolving threats

    1. Photo of Patrick Harr

      Patrick Harr

      CEO, SlashNext

  12. The Privilege Is Mine: Protecting Endpoints From Compromised Credentials

    Why staying on top of endpoints will strengthen security defenses and keep sensitive data safe

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  13. 3 Key Reasons Zero Trust Network Access is Critical for Today's Mobile Worker

    Networks have to be secure, but that security shouldn’t prevent innovation and forward movement in business

    1. Photo of Aaron Kiemele

      Aaron Kiemele

      Chief Information Security Officer, Jamf

  14. Phishing Is an Insider Risk - It's Time to Tackle It Like One

    Employees are your last line of defense from phishing – empower them, and you can turn them into your biggest strength

    1. Photo of Jack  Chapman

      Jack Chapman

      VP of Threat Intelligence, Egress

  15. #HowTo: Protect Against Remote Code Execution Attacks

    Organizations must understand how their software runs and have the capability to stop any digression in milliseconds

    1. Photo of Satya Gupta

      Satya Gupta

      co-founder and chief technology officer, Virsec

  16. What Happens When You Give Excessive Access Rights to Employees

    Strengthening your security with authentication and monitoring will keep your company’s data secure

    1. Photo of Alexey Kessenikh

      Alexey Kessenikh

      CISO, Soveren

  17. Haugen Testimony Shows Cybersecurity Researchers Must Also Consider Mental Health

    Cybersecurity researchers have the potential to improve the lives of tens of millions of people

    1. Photo of Corye Douglas

      Corye Douglas

      National Guardsman for New York State.

    2. Photo of Austen D. Givens,

      Austen D. Givens,

      Professor at Utica College

    3. Photo of Nikki S. Sanders

      Nikki S. Sanders

      Utica College alumna

  18. The Three OT Security Dangers of R&R

    Why upfront thought, strategic planning and a bit of patience will go a long way

    1. Photo of Daniel Trivellato

      Daniel Trivellato

      TitleVice President, Product & Engineering (OT, IoT, IoMT), Forescout

  19. 4 Reasons Why Companies Fail to Fix Cloud Misconfigurations

    Lack of cloud security knowledge, team alignment, visibility and speed explain why companies suffer misconfiguration breaches

    1. Photo of Nikhil Girdhar

      Nikhil Girdhar

      Head of Product Marketing, VMware

What’s Hot on Infosecurity Magazine?