Infosecurity Opinions

  1. Phishing Reports Show You There's a Problem, but What's Next?

    Why investing in fun and engaging training for your team will pay dividends

    1. Photo of Drew Rose

      Drew Rose

      CSO and CO-Founder, Living Security

  2. Three Critical Cybersecurity Metrics to Fight Back

    How CISOs can fix security weaknesses to stop and mitigate attacks effectively

    1. Photo of Alastair Williams

      Alastair Williams

      Director of Solutions Engineering for EMEA at Skybox Security

  3. #HowTo: Counter Common E-commerce Threats

    As e-commerce continues to grow, online retailers are more susceptible to outside threats

    1. Photo of Sean Leach

      Sean Leach

      chief product architect, Fastly

  4. The True Cost of DDoS Attacks

    The cost of DDoS attacks is on the rise, and only an active defense will counter their potentially crippling impact

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  5. What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

    The practical uses of AI to address the skills shortage in cybersecurity

    1. Photo of Mark  Herridge

      Mark Herridge

      Chief Information Security Officer, Calligo

  6. Prioritizing Cybersecurity Awareness Training in the Wake of Phishing Attacks

    Training improves the cyber resilience of employees and reduces the likelihood of an organization suffering a breach

    1. Photo of Jason Stirland

      Jason Stirland

      Chief Technical Officer at DeltaNet International Limited

  7. Key Zero Trust Practices for a Cyber-Secure Hybrid Workforce

    Follow these zero trust best practices to secure data and assets

    1. Photo of Heather Hinton

      Heather Hinton

      Chief Information Security Officer, RingCentral

  8. Analyzing the Twitch Hack and a Potential Security Hole Around IRC

    The attack seems to be the work of an individual attacker intent on disrupting the company

    1. Photo of Vince Warrington

      Vince Warrington

      CEO, Dark Intelligence

  9. Schools Prove Easy Targets For Hackers

    Schools have significant revenues, a general lack of cyber security and a low perception of information security

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  10. Strategic Security for the Post-pandemic Era: How to Close Crucial Gaps in Protection

    With threat actors circling, there’s an urgent need to start these efforts now

    1. Photo of Craig Hattersley

      Craig Hattersley

      CTO, SOC.OS

  11. #HowTo: Avoid Credential Abuse

    Cloud-based MFA can enhance organizations' security

    1. Photo of Alexandre Cagnoni

      Alexandre Cagnoni

      director of authentication, WatchGuard Technologies

  12. Developers and Security - Using Data to Consolidate and Collaborate

    Looking at data in context can help teams improve their results, consolidate their tooling and collaborate more effectively

    1. Photo of Colin Fernandes

      Colin Fernandes

      EMEA Product Director, Sumo Logic

  13. Latest OMB Memo Doubles Down on Flawed NIST Critical Software Standards

    The administration must re-examine NIST’s new standards and seize the opportunity to make a real difference

    1. Photo of Jeff Williams

      Jeff Williams

      CTO, Contrast Security

  14. In this Perpetual Distributed Workplace, How Do We Trust Each Other?

    The inability to trust becomes a cyclical challenge that could stifle employee productivity and corporate innovation for years

    1. Photo of Neil Costigan

      Neil Costigan

      CEO, BehavioSec

  15. Why the M&A Boom of 2021 Could Be a Data Security Bust

    Addressing data dangers as soon as possible should be a fundamental part of the M&A process

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  16. What California, Colorado and Virginia Teach Us About the Future of US Privacy Law

    Key trends that will influence other states

    1. Photo of Ali Jessani

      Ali Jessani

      Associate, WilmerHale

  17. Protecting Critical Infrastructure in the Digital Battlefield

    Security and safety must be inherent and assured characteristics for all intelligent systems throughout their lifecycle

    1. Photo of Roberto  Valla

      Roberto Valla

      Field Digital Transformation Officer (DTO), Wind River

  18. #HowTo: Defend Against Rising Application Layer Attacks

    Advances in applications have introduced a number of new often overlooked, security vulnerabilities

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  19. Make Employees Part of the Security Solution

    Organizations should build employee training within overall security solutions

    1. Photo of Lior Kohavi

      Lior Kohavi

      Chief Strategy Officer and EVP for Advanced Solutions, Cyren

  20. Reducing Cookie Walls and Banners Post-Brexit: There Must Be a Better Way

    Are proposed legislative changes in regard to cookies really necessary?

    1. Photo of Richard Hancock

      Richard Hancock

      data protection officer, GlobalSign

What’s Hot on Infosecurity Magazine?