Infosecurity Opinions

  1. What Happens When You Give Excessive Access Rights to Employees

    Strengthening your security with authentication and monitoring will keep your company’s data secure

    1. Photo of Alexey Kessenikh

      Alexey Kessenikh

      CISO, Soveren

  2. #HowTo: Protect Against Remote Code Execution Attacks

    Organizations must understand how their software runs and have the capability to stop any digression in milliseconds

    1. Photo of Satya Gupta

      Satya Gupta

      co-founder and chief technology officer, Virsec

  3. Haugen Testimony Shows Cybersecurity Researchers Must Also Consider Mental Health

    Cybersecurity researchers have the potential to improve the lives of tens of millions of people

    1. Photo of Corye Douglas

      Corye Douglas

      National Guardsman for New York State.

    2. Photo of Austen D. Givens,

      Austen D. Givens,

      Professor at Utica College

    3. Photo of Nikki S. Sanders

      Nikki S. Sanders

      Utica College alumna

  4. The Three OT Security Dangers of R&R

    Why upfront thought, strategic planning and a bit of patience will go a long way

    1. Photo of Daniel Trivellato

      Daniel Trivellato

      TitleVice President, Product & Engineering (OT, IoT, IoMT), Forescout

  5. 4 Reasons Why Companies Fail to Fix Cloud Misconfigurations

    Lack of cloud security knowledge, team alignment, visibility and speed explain why companies suffer misconfiguration breaches

    1. Photo of Nikhil Girdhar

      Nikhil Girdhar

      Head of Product Marketing, VMware

  6. Least Privilege Regaining Popularity

    Why zero trust provides added scalability required to secure modern multi-cloud environments

    1. Photo of Nathan Howe

      Nathan Howe

      Vice president of emerging technologies, Zscaler

  7. Digesting the Alphabet Soup - Can EDR and MDR Co-exist?

    How teams can best leverage a portfolio of detection and response strategies

    1. Photo of Josh Davies

      Josh Davies

      Product Manager, Alert Logic

  8. #HowTo: Implement a Strong Cybersecurity Program for Small Businesses

    How can small businesses develop cost-effective security programs

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  9. A Recipe for Destruction: Municipalities and Managing Cyber Risk

    From Baltimore to Birmingham, Paris to Portland, municipalities are under attack

    1. Photo of Yehudah Sunshine

      Yehudah Sunshine

      Head of PR at Odix

  10. Implementing Zero Trust Principles in a Connected World

    Foundational controls and measures determine if zero trust achieves security goals

    1. Photo of James Wilde

      James Wilde

      Global Head of Security Strategy, Sphere

  11. The Journey to Zero Trust Begins with Identity

    Identity is the fabric that ties the zero trust framework together

    1. Photo of Zain Malik

      Zain Malik

      Senior Product Marketing Manager, Ping Identity

  12. The Hard Truth About Network Security

    Failing to secure identities and data in the public cloud will jeopardize an enterprise

    1. Photo of Eric Kedrosky

      Eric Kedrosky

      CISO, Sonrai Security

  13. #HowTo: Protect Your Organization's Root Accounts

    As attacks on root account credentials continue to rise, organizations should take an active role in securing these credentials as much as possible

    1. Photo of Ray Canzanese

      Ray Canzanese

      director, Netskope Threat Labs

  14. Ensuring Visibility and Data Access Control Across Clouds

    Why businesses must adopt a delegated governance approach

    1. Photo of Balaji Ganesan

      Balaji Ganesan

      CEO and co-founder, Privacera

  15. Digitalization is Everywhere, So Why isn't Healthcare Keeping Up?

    If the healthcare industry is to continue its rapid digitalization, it must use a fit-for-purpose solution

    1. Photo of Matt Roberts

      Matt Roberts

      Healthcare Practice Lead, Juniper Networks

  16. Team Sports in Cybersecurity: Collaboration Wins Gold

    Helping organizations combat ransomware threats will give them the confidence to achieve gold-medal-worthy security

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  17. Thwarting Insider Threats, Ransomware and Protecting Water and Wastewater Facilities

    WWS facilities deserve the most sophisticated defense the market offers

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  18. What is Identity and Access Management, and Why is it so important?

    With IAM measures, organizations can prevent unauthorized access from online hackers and protect sensitive data

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  19. Simplifying Multicloud Security in a Cloud-Native World

    Five steps organizations can take to simplify multi-cloud security

    1. Photo of Gary Alterson

      Gary Alterson

      VP of Security Solutions, Rackspace

  20. Building Privacy Into AI: Is the Future Federated?

    Machine learning requires data to be stored on a centralized server, resulting in a plethora of privacy implications

    1. Photo of Aydin Ulas

      Aydin Ulas

      Data Scientist, Truata

What’s Hot on Infosecurity Magazine?