Infosecurity Opinions

  1. Developing Gold Medal-Worthy Protection Against Video Pirates

    Developing a zero trust policy is key to an effective anti-piracy strategy

    1. Photo of Ian Munford

      Ian Munford

      director of industry strategy, Akamai

  2. Adapting Data Security for a Permanent Hybrid Working Environment

    The world has permanently changed, and organizations must adapt their security policy to match

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  3. Do Open-Source Supply Chains Leave Security Gaps in Your Organization?

    If security procedures around codesigning are not addressed quickly, attacks utilizing open source software techniques will only increase

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi, a CyberArk Company

  4. Why Ransomware Protection Should Start with User Awareness

    Humans are normally easier to hack than networks, so this is where defensive efforts should be focused

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  5. #HowTo: Improve Ransomware Resilience Across Remote Working Environments

    There are a range of technologies available that can offer high levels of resiliency to ransomware among remote workforces

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

  6. Data Security in the Cloud: Adapting to a New Era of Modernization

    Organizations must improve their cloud data security to avoid the risk of a substantial data breach

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  7. Better Accountability and Security Needed to Improve Government Aid

    Improved accountability, security and identity verification is essential to get the most out of government aid programs

    1. Photo of Jonathan McDonald

      Jonathan McDonald

      executive vice president, U.S. public sector, TransUnion

  8. Aiming at a Moving Target: The Future of Security Teams in a Dynamic Environment

    How allies can support security teams in fast-changing environments

    1. Photo of Chris Rothe

      Chris Rothe

      Co-Founder of Red Canary

  9. A Presidential Wakeup on Cybersecurity

    What should the private sector take from President Biden's most recent executive order on cybersecurity?

    1. Photo of Craig Sanderson

      Craig Sanderson

      vp of product management, Infoblox

  10. Paying a Ransom is Not an Option - So What Should Be Done Instead?

    Organizations should implement measures to prevent as many ransomware infections as possible

    1. Photo of Ilia Sotnikov

      Ilia Sotnikov

      security strategist & VP of user experience, Netwrix

  11. Why SIEM is Not a Silver Bullet for Threat Detection and Response

    Is SIEM really essential for threat detection and response?

    1. Photo of Dave Mareels

      Dave Mareels

      CEO & founder, SOC.OS

  12. Navigating the New Security Threats to Business Travel after COVID-19

    Organizations must be aware of new cyber-threats to business travel post-COVID and put in place measures to mitigate them

    1. Photo of Paul Mansfield

      Paul Mansfield

      lead cyber threat intelligence analyst, Accenture

  13. #HowTo: Strengthen Supply Chain Security

    Mitigating supply chain risk is increasingly difficult, but there are many options available to organizations

    1. Photo of Jonathan Dambrot

      Jonathan Dambrot

      principal, KPMG

    2. Photo of Ed Jennings

      Ed Jennings

      CEO, Quickbase

  14. Ransomware: Why 'To Pay or Not to Pay' is Not the Right Question

    Why sophisticated technologies are key to avoiding the 'pay or not to pay' conundrum

    1. Photo of Justin Fier

      Justin Fier

      Director for Cyber Intelligence & Analytics, Darktrace

  15. Can You Identify and Defend Your Organization's Crown Jewels?

    You cannot protect your assets effectively if you do not have insight into which assets are most valuable.

    1. Photo of Uri Levy

      Uri Levy

      SVP global strategy, XM Cyber

  16. Slow and Steady Wins the Race to the Cloud

    Rushing through cloud migration will leave organizations more vulnerable to security breaches

    1. Photo of Randy Shore

      Randy Shore

      VP of delivery and support, Cloudtamer.io

  17. Charting a Path Out of an Epidemic of Hidden Breaches

    The cyber industry needs to get better at detecting and preventing hidden breaches

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  18. Considerations When Sharing Information with an AG's Office

    What are the risks associated with producing info to a state AG?

    1. Photo of Mira Baylson

      Mira Baylson

      partner, state attorneys general group, Cozen O'Connor

    2. Photo of Lori Kalani

      Lori Kalani

      co-chair of the State Attorneys General Group, Cozen O'Connor

    3. Photo of Meghan Stoppel

      Meghan Stoppel

      partner, state attorneys general group, Cozen O'Connor

  19. Why Businesses Must Diversify Their Tech

    In light of the widespread website outage last months, should organizations look to diversify their tech providers?

    1. Photo of Jake Madders

      Jake Madders

      co-founder and director, Hyve Managed Hosting

  20. #HowTo: Approach Budgeting as a CISO

    CISOs need to assess how security can contribute to business objectives to manage their budgets

    1. Photo of Giuseppe Brizio

      Giuseppe Brizio

      CISO EMEA, Qualys

What’s Hot on Infosecurity Magazine?