Infosecurity Opinions

  1. Embedded Fraud Analytics for DeFi Protocols

    Fraud analytics systems are needed to help build secure DeFi ecosystems

    1. Photo of Debanjan Chatterjee

      Debanjan Chatterjee

      Fraud Analytics professional

  2. Security Best Practices for Hybrid Work Environments

    With hybrid working becoming the norm in many organizations, IT teams must get ahead to optimize security

    1. Photo of Chris Conry

      Chris Conry

      CIO, Fuze

  3. Challenges and Future Trends in Cryptography

    What cryptography innovations to better secure data and improve infrastructures can we look forward to?

    1. Photo of Ryan Smith

      Ryan Smith

      vice president, global business development, Futurex

  4. #HowTo: Stay Secure When Deploying Robotic Process Automation

    With robotic process automation becoming increasingly popular, what security measures are required?

    1. Photo of Cathy Tornbohm

      Cathy Tornbohm

      distinguished VP research analyst, Gartner

  5. When Cyber-Attacks Lead to Disasters, Does the Stafford Act Apply?

    As critical infrastructure becomes more vulnerable to disastrous cyber-attacks, the US must seek novel solutions to keep its citizens safe

    1. Photo of Matt Lyttle

      Matt Lyttle

      associate director, National Security, Guidehouse

    2. Photo of Yvonne Manzo

      Yvonne Manzo

      cyber policy and planning, National Security, Guidehouse

  6. Business Leaders Need to Quantify Their Cyber Risk

    Consistent CRQ practice is key to quantifying cyber risk, enabling better business decisions to be made

    1. Photo of Sean McDermott

      Sean McDermott

      CEO, RedMonocle

  7. Identity Security Can Reshape Enterprise IT Post-Pandemic

    Are identity-focused security measures necessary to support new ways of working?

    1. Photo of Emma Maslen

      Emma Maslen

      VP and GM, EMEA & APAC, Ping Identity

  8. Why EU Data Laws Remain Important to UK Businesses Post-Brexit

    It is critical UK businesses stay up to date with changes to EU and UK data regulations

    1. Photo of Susana Figueredo

      Susana Figueredo

      senior legal and compliance executive, Incubeta

  9. An Evolving Cyber Threat: Ransomware-as-a-Service

    RaaS has lowered the barrier to entry to launch ransomware attacks, making this vector a much greater threat to organizations

    1. Photo of Chris Pogue

      Chris Pogue

      head of strategic alliances, Nuix

  10. #HowTo: Accelerate the Enterprise Journey to Passwordless

    How can organizations design a phased strategy to passwordless authentication?

    1. Photo of Wolfgang  Goerlich

      Wolfgang Goerlich

      Advisory CISO, Duo Security

  11. Why It's Time for Software Development to Wake Up

    There's too much at stake to allow software development security languish any longer

    1. Photo of Daniel Spicer

      Daniel Spicer

      VP of security, Ivanti

  12. Empowering People to Make Meaningful Change to Security Behaviors

    Rather than seeing people as the source of security problems, people need to be part of the solution

    1. Photo of Anete Poriete

      Anete Poriete

      Researcher

  13. Yes...We Need More Women in Cybersecurity, But How?

    Equal outcomes for women today create the possibility for equal opportunities for women tomorrow.

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  14. Cybersecurity Tips for Back to School Season 2021

    How can students, parents and teachers stay safe from cyber-threats as we approach back to school season?

    1. Photo of Jen Miller-Osborn

      Jen Miller-Osborn

      Deputy Director, Threat Intelligence, Unit 42, Palo Alto Networks

  15. The Cyber War on our Critical Infrastructure and How to Win

    Companies in the critical infrastructure sector must do more to protect themselves from the growing threat of cyber-attacks

    1. Photo of Ara Aslanian

      Ara Aslanian

      CEO, Inverselogic

  16. The Importance of Being Cyber Resilient

    True cyber resilience requires an ongoing business effort

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  17. Will AI/ML Solve the Cybersecurity Skills Gap?

    Much more needs to be done to realize the full potential of AI and ML in the cybersecurity sector

    1. Photo of Angelica Grillo

      Angelica Grillo

      associate consultant, Crossword Cybersecurity

  18. #HowTo: Enhance Your Phishing Training

    As phishing campaigns become more sophisticated, user awareness training must keep up

    1. Photo of Nick Emanuel

      Nick Emanuel

      senior director of product, Webroot

  19. Office 365 Remains a Target for Cyber-criminals

    With Office 365 an integral part of many organizations' operations, it has become a major target for cyber-criminals

    1. Photo of Tim Wade

      Tim Wade

      office of CTO technical director, Vectra

  20. How Organizations Can Fight Back Against Ransomware

    How do organizations upgrade their traditional systems to combat the surge in ransomware?

    1. Photo of Pritesh Parekh

      Pritesh Parekh

      chief trust & security officer, VP of engineering, Delphix

What’s Hot on Infosecurity Magazine?