Infosecurity Opinions

  1. #HowTo: Make You and Your Departments More Digitally Secure

    Organizations only need to do the simplest things to protect their data

    1. Photo of Sam Johnstone

      Sam Johnstone

      CMO, BookingLive

  2. Ransomware is Harming Cybersecurity Strategy: What Can Organizations Do?

    Smarter use of technology can protect organizations from ransomware attacks

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  3. Why Are Industrial Control System Attacks Increasing?

    The answer lies in the convergence of OT and IT, exposing industrial environments with outdated technologies to the internet

    1. Photo of Jeff Cornelius

      Jeff Cornelius

      Executive Vice President of Cyber-Physical Security, Darktrace

  4. President Biden Has Opened the Door to Zero Trust - Will Boris Johnson Follow Suit?

    Is it time for the UK government to endorse zero trust?

    1. Photo of Tony Scott

      Tony Scott

      former federal CIO for the Obama Administration; board member, ColorTokens

  5. Avoiding the Achilles Heel of Non-European Cybersecurity

    Should organizations choose a local provider in regard to their data security?

    1. Photo of John Vestberg

      John Vestberg

      CEO, Clavister

  6. #HowTo: Secure Distributed Infrastructures

    There are six areas critical to protecting distributed infrastructures

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  7. Securing the Network of the Future for Remote Work

    As remote work surges, it is vital organizations enhance their network security

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  8. Rethinking Security When Identity is the Ultimate Attack Surface

    The pandemic-induced accelerated digital transformation has seen new hybrid working models disrupting how identities are managed

    1. Photo of Craig Ramsay

      Craig Ramsay

      presales consultant, Omada

  9. Make or Break: What To Do When Security Solutions Fail

    Why a strong business continuity strategy built around the concept of zero trust is essential

    1. Photo of James Hughes

      James Hughes

      Vice President, Systems Engineering & Enterprise CTO, Rubrik

  10. UK's General Data Protection Regulation (GDPR) Explained

    Why there's a duty to protect the personal data of companies like Total Fitness under the UK's iteration of GDPR

    1. Photo of Jack Dunn

      Jack Dunn

      Associate, Bryan Cave Leighton Paisner

    2. Photo of Geraldine Scali

      Geraldine Scali

      Partner, Bryan Cave Leighton Paisner

  11. GSaaS: The Changing Dynamics of Cybersecurity

    GSaaS will shape the future of organizations' data security

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  12. Why AI and Automation Provide Superhuman Security

    While there's no catch-all in IT security, AI allows organizations to finally get ahead in cybersecurity's arms race

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

  13. Cloud Misconfigurations: The Hidden but Preventable Threat to Cloud Data

    Misconfigured cloud environments is an increasing security issue for businesses

    1. Photo of Assaf Morag

      Assaf Morag

      lead data analyst, Aqua Security

  14. Securing a Hybrid Work Environment: The Worst of Both Worlds

    The new threat landscape and how organizations can prepare and protect themselves

    1. Photo of Randy Watkins

      Randy Watkins

      Chief Technology Officer, Critical Start

  15. The Three Pillars of Unified Risk Management for Product Security

    In today's threat landscape, security requires a holistic approach involving both software and hardware aspects

    1. Photo of Altaz Valani

      Altaz Valani

      director, insights research, Security Compass

  16. #HowTo: Defend Against Increasingly Convincing Phishing Attacks

    Cyber-criminals have refined their phishing techniques during the pandemic, and organizations must improve their defenses

    1. Photo of Alex Holland

      Alex Holland

      Principal Threat Researcher, HP

  17. Prioritize the Fraud Epidemic Arising from the Pandemic

    Finding the root cause of fraud involves undertaking offensive counter-fraud

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  18. Combating Cyber-Threats in the Age of Big Tech

    Why big tech must work hard at IT security, using their own in-house expertise and benefiting from third-party security experts

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  19. Why the Pegasus Mobile Spyware Incident is a Wake-Up Call

    The Pegasus spyware incident shows it's vital to collaborate in the technology sector to enhance security and privacy

    1. Photo of Burak Agca

      Burak Agca

      security engineer, Lookout Inc

  20. Why Apple's iCloud+ Provides a Future Unlocking for Authoritarian Government Data Surveillance

    Why the future belongs to organizations that don’t see a dichotomy between regulation and advancement

    1. Photo of Tunio Zafer

      Tunio Zafer

      CEO at pCloud

What’s Hot on Infosecurity Magazine?