Infosecurity Opinions

  1. Slow and Steady Wins the Race to the Cloud

    Rushing through cloud migration will leave organizations more vulnerable to security breaches

    1. Photo of Randy Shore

      Randy Shore

      VP of delivery and support, Cloudtamer.io

  2. Charting a Path Out of an Epidemic of Hidden Breaches

    The cyber industry needs to get better at detecting and preventing hidden breaches

    1. Photo of Jamie Brummell

      Jamie Brummell

      CTO and founder, Socura

  3. Considerations When Sharing Information with an AG's Office

    What are the risks associated with producing info to a state AG?

    1. Photo of Mira Baylson

      Mira Baylson

      partner, state attorneys general group, Cozen O'Connor

    2. Photo of Lori Kalani

      Lori Kalani

      co-chair of the State Attorneys General Group, Cozen O'Connor

    3. Photo of Meghan Stoppel

      Meghan Stoppel

      partner, state attorneys general group, Cozen O'Connor

  4. Why Businesses Must Diversify Their Tech

    In light of the widespread website outage last months, should organizations look to diversify their tech providers?

    1. Photo of Jake Madders

      Jake Madders

      co-founder and director, Hyve Managed Hosting

  5. #HowTo: Approach Budgeting as a CISO

    CISOs need to assess how security can contribute to business objectives to manage their budgets

    1. Photo of Giuseppe Brizio

      Giuseppe Brizio

      CISO EMEA, Qualys

  6. The Countdown Towards Zero Trust and MFA

    What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

    1. Photo of Dr Bobby Blumofe

      Dr Bobby Blumofe

      chief technology officer, Akamai

  7. The Evolution of Ransomware and How to Move Forward

    Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iBoss

  8. Staying On Guard Against Cyber-Attacks

    Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  9. Understanding and Mitigating Cyber Risk in the Healthcare System

    Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

    1. Photo of Ronen Lago

      Ronen Lago

      CTO and co-founder, CYE

  10. #HowTo: Be More Resilient Against Ransomware

    Organizations need to start designing their disaster recovery plans with ransomware in mind

    1. Photo of Robert Capps

      Robert Capps

      VP of emerging technologies, NuData Security

  11. Malware-as-a-Service is a Booming Business

    Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

    1. Photo of Ron Davidson

      Ron Davidson

      VP R&D and CTO, Skybox Security

  12. The Power of Anonymity in Supply Chain Security

    The rise in supply chain attacks should serve as a warning to organizations to update their email security

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  13. Going Passwordless: What Are the Benefits For Your Business?

    Given the number of breaches associated with stolen credentials, should orgs go passwordless?

    1. Photo of Steve Whiter

      Steve Whiter

      director, Appurity

  14. How DNS Security Can Help Combat the IoT Challenge

    Domain name system (DNS) can help IT teams protect their network against shadow IT threats

    1. Photo of Keith Glancey

      Keith Glancey

      systems engineering manager, Infoblox

  15. Three Key Elements of a Defense-in-Depth Approach to Phishing

    What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  16. #HowTo: Protect Medical Institutions from Cyber-Attacks

    Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

    1. Photo of Shimrit Tzur-David

      Shimrit Tzur-David

      CTO of Secret Double Octopus

  17. How Ransomware is Teaming Up with DDoS

    Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  18. Data Sovereignty and Privacy Compliance Post Schrems II

    How can organizations remain compliant following the Schrems II decision last year?

    1. Photo of Rob Stubbs

      Rob Stubbs

      product director, Fortanix

  19. Why Enterprise Users Can't Wait for Patch Updates

    Are software patches often little more than a glorified form of Whack-A-Mole?

    1. Photo of Eric Helmer

      Eric Helmer

      chief technology officer, Rimini Street

  20. How Has the Education Sector Adapted to Life in the Cloud?

    Education institutions have faced particular challenges with cloud adoption during COVID-19

    1. Photo of Kieran Nalton

      Kieran Nalton

      senior security consultant, SureCloud

What’s Hot on Infosecurity Magazine?