Infosecurity Opinions

  1. How Ground-Breaking is WhatsApp's Fine?

    Every privacy policy needs careful thought and reflects the company’s actual data processing

    1. Photo of Alexander  Egerton

      Alexander Egerton

      Partner and privacy compliance officer at Seddons

  2. How To Improve Patch Management

    Why it's vital to creat a patching cycle that continuously updates your inventory, manages priorities and delivers updates

    1. Photo of Paul Baird

      Paul Baird

      Chief technical security officer, Qualys

  3. Hospital Security Teams: Are the Odds Stacked Against Them?

    Hospital executives need to invest the resources necessary to ensure the safety of their patients

    1. Photo of Azi Cohen

      Azi Cohen

      CEO, CyberMDX

  4. Cybersecurity 2021: Where Are We Moving Into Q4?

    Why strong digital countermeasures, application allow-listing and endpoint encryption are gaining traction

    1. Photo of Jerry Ray

      Jerry Ray

      COO, SecureAge

  5. Race Against Time: Why a Robust Application Security Posture is Essential

    Application and security teams need to improve their synergy to protect organizations from data breaches

    1. Photo of Gregg Ostrowski

      Gregg Ostrowski

      Regional CTO, Cisco AppDynamics

  6. #HowTo: Make You and Your Departments More Digitally Secure

    Organizations only need to do the simplest things to protect their data

    1. Photo of Sam Johnstone

      Sam Johnstone

      CMO, BookingLive

  7. Ransomware is Harming Cybersecurity Strategy: What Can Organizations Do?

    Smarter use of technology can protect organizations from ransomware attacks

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  8. Why Are Industrial Control System Attacks Increasing?

    The answer lies in the convergence of OT and IT, exposing industrial environments with outdated technologies to the internet

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  9. President Biden Has Opened the Door to Zero Trust - Will Boris Johnson Follow Suit?

    Is it time for the UK government to endorse zero trust?

    1. Photo of Tony Scott

      Tony Scott

      former federal CIO for the Obama Administration; board member, ColorTokens

  10. Avoiding the Achilles Heel of Non-European Cybersecurity

    Should organizations choose a local provider in regard to their data security?

    1. Photo of John Vestberg

      John Vestberg

      CEO, Clavister

  11. #HowTo: Secure Distributed Infrastructures

    There are six areas critical to protecting distributed infrastructures

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  12. Securing the Network of the Future for Remote Work

    As remote work surges, it is vital organizations enhance their network security

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  13. Rethinking Security When Identity is the Ultimate Attack Surface

    The pandemic-induced accelerated digital transformation has seen new hybrid working models disrupting how identities are managed

    1. Photo of Craig Ramsay

      Craig Ramsay

      presales consultant, Omada

  14. Make or Break: What To Do When Security Solutions Fail

    Why a strong business continuity strategy built around the concept of zero trust is essential

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  15. UK's General Data Protection Regulation (GDPR) Explained

    Why there's a duty to protect the personal data of companies like Total Fitness under the UK's iteration of GDPR

    1. Photo of Jack Dunn

      Jack Dunn

      Associate, Bryan Cave Leighton Paisner

    2. Photo of Geraldine Scali

      Geraldine Scali

      Partner, Bryan Cave Leighton Paisner

  16. GSaaS: The Changing Dynamics of Cybersecurity

    GSaaS will shape the future of organizations' data security

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  17. Why AI and Automation Provide Superhuman Security

    While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

  18. Cloud Misconfigurations: The Hidden but Preventable Threat to Cloud Data

    Misconfigured cloud environments is an increasing security issue for businesses

    1. Photo of Assaf Morag

      Assaf Morag

      lead data analyst, Aqua Security

  19. Securing a Hybrid Work Environment: The Worst of Both Worlds

    The new threat landscape and how organizations can prepare and protect themselves

    1. Photo of Randy Watkins

      Randy Watkins

      Chief Technology Officer, Critical Start

  20. The Three Pillars of Unified Risk Management for Product Security

    In today's threat landscape, security requires a holistic approach involving both software and hardware aspects

    1. Photo of Altaz Valani

      Altaz Valani

      director, insights research, Security Compass

What’s Hot on Infosecurity Magazine?