Infosecurity Opinions

  1. The Importance of Being Cyber Resilient

    True cyber resilience requires an ongoing business effort

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  2. Will AI/ML Solve the Cybersecurity Skills Gap?

    Much more needs to be done to realize the full potential of AI and ML in the cybersecurity sector

    1. Photo of Angelica Grillo

      Angelica Grillo

      associate consultant, Crossword Cybersecurity

  3. #HowTo: Enhance Your Phishing Training

    As phishing campaigns become more sophisticated, user awareness training must keep up

    1. Photo of Nick Emanuel

      Nick Emanuel

      senior director of product, Webroot

  4. Office 365 Remains a Target for Cyber-criminals

    With Office 365 an integral part of many organizations' operations, it has become a major target for cyber-criminals

    1. Photo of Tim Wade

      Tim Wade

      office of CTO technical director, Vectra

  5. How Organizations Can Fight Back Against Ransomware

    How do organizations upgrade their traditional systems to combat the surge in ransomware?

    1. Photo of Pritesh Parekh

      Pritesh Parekh

      chief trust & security officer, VP of engineering, Delphix

  6. Developing Gold Medal-Worthy Protection Against Video Pirates

    Developing a zero trust policy is key to an effective anti-piracy strategy

    1. Photo of Ian Munford

      Ian Munford

      director of industry strategy, Akamai

  7. Adapting Data Security for a Permanent Hybrid Working Environment

    The world has permanently changed, and organizations must adapt their security policy to match

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  8. Do Open-Source Supply Chains Leave Security Gaps in Your Organization?

    If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi, a CyberArk Company

  9. Why Ransomware Protection Should Start with User Awareness

    Humans are normally easier to hack than networks, so this is where defensive efforts should be focused

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  10. #HowTo: Improve Ransomware Resilience Across Remote Working Environments

    There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  11. Data Security in the Cloud: Adapting to a New Era of Modernization

    Organizations must improve their cloud data security to avoid the risk of a substantial data breach

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  12. Better Accountability and Security Needed to Improve Government Aid

    Improved accountability, security and identity verification is essential to get the most out of government aid programs

    1. Photo of Jonathan McDonald

      Jonathan McDonald

      executive vice president, U.S. public sector, TransUnion

  13. Aiming at a Moving Target: The Future of Security Teams in a Dynamic Environment

    How allies can support security teams in fast-changing environments

    1. Photo of Chris Rothe

      Chris Rothe

      Co-Founder of Red Canary

  14. A Presidential Wakeup on Cybersecurity

    What should the private sector take from President Biden's most recent executive order on cybersecurity?

    1. Photo of Craig Sanderson

      Craig Sanderson

      vp of product management, Infoblox

  15. Paying a Ransom is Not an Option - So What Should Be Done Instead?

    Organizations should implement measures to prevent as many ransomware infections as possible

    1. Photo of Ilia Sotnikov

      Ilia Sotnikov

      security strategist & VP of user experience, Netwrix

  16. Why SIEM is Not a Silver Bullet for Threat Detection and Response

    Is SIEM really essential for threat detection and response?

    1. Photo of Dave Mareels

      Dave Mareels

      CEO & founder, SOC.OS

  17. Navigating the New Security Threats to Business Travel after COVID-19

    Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them

    1. Photo of Paul Mansfield

      Paul Mansfield

      lead cyber threat intelligence analyst, Accenture

  18. #HowTo: Strengthen Supply Chain Security

    Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations

    1. Photo of Jonathan Dambrot

      Jonathan Dambrot

      principal, KPMG

    2. Photo of Ed Jennings

      Ed Jennings

      CEO, Quickbase

  19. Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question

    Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum

    1. Photo of Justin Fier

      Justin Fier

      Director for Cyber Intelligence & Analytics, Darktrace

  20. Can You Identify and Defend Your Organization's Crown Jewels?

    You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

    1. Photo of Uri Levy

      Uri Levy

      SVP global strategy, XM Cyber

What’s Hot on Infosecurity Magazine?