Infosecurity Opinions

  1. Signs, Causes and Solutions for Network Data Breaches

    What are the common signs and solutions for dealing with network breaches?

    1. Photo of Ali Neil

      Ali Neil

      director of international security solutions, Verizon

  2. #HowTo: Ensure Third Parties Don't Compromise Your Supply Chain

    More disciplined attention is required to make sure third party vendors don't compromise your supply chain

    1. Photo of Gyan Prakash

      Gyan Prakash

      head of information security, Altimetrik

  3. Protecting CNI: It’s About the Collective

    Nominet argues that protecting CNI requires a collaborative approach

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  4. Disengaged Employees Could Become Your Organization's Greatest Security Threat

    Organizations must establish accountability for security to avoid the danger posed by disengaged employees

    1. Photo of Lucas Szymanowski

      Lucas Szymanowski

      director of information security and GRC, Wrike

  5. What Are GDPR's Hidden Benefits Three Years On?

    What should organizations do to ensure they meet GDPR standards on data security and privacy?

    1. Photo of Adam Bird

      Adam Bird

      CEO and co-founder, Cronofy

  6. What's New in the EU's Updated Standard Contractual Clauses?

    Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Bridget Treacy

      Bridget Treacy

      partner, Hunton Andrews Kurth LLP

  7. Is the "Cyber Skills Shortage" a Misnomer?

    If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage

    1. Photo of Dr Leila Powell

      Dr Leila Powell

      lead data scientist, Panaseer

  8. #HowTo: Approach Identity Management

    To support identity effectively, we have to implement processes that use standards and embrace technologies

    1. Photo of Greg Keller

      Greg Keller

      CTO, JumpCloud

  9. Fileless Attacks: Addressing Evolving Malware Threats

    Organizations must consider fileless malware threats as well as traditional approaches

    1. Photo of Eric Barnes

      Eric Barnes

      cyber services architect, Integrity360

  10. What We Can Learn from Recent High Profile Cyber Attacks?

    What actions should organisations take to improve their security amid rising and more sophisticated threats?

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  11. Proactive Security Key to Combatting Supply Chain Attacks

    What lessons can be learned from the recent Air India data breach?

    1. Photo of Robert Fitzsimons

      Robert Fitzsimons

      product manager, Telesoft Technologies

  12. How Innovation Powered by Privacy Can Eliminate Data Waste

    Organizations need to embrace a privacy mindset to use data successfully

    1. Photo of Michael Ingrassia

      Michael Ingrassia

      president and general counsel, Truata

  13. What Will Enterprise Security Look Like After COVID-19?

    Orgs need to focus on securing the digital shift during COVID-19

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  14. #HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment

    How can orgs get the most from cloud-native environments and agile delivery?

    1. Photo of Andreas Lehofer

      Andreas Lehofer

      chief product officer, Dynatrace

  15. Biden’s Executive Order: The Inclusivity Imperative

    The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order

    1. Photo of Michael Oldham

      Michael Oldham

      CEO, PortSys

  16. Why it’s Time to Adopt a CISO Code of Conduct

    CISOs need to get much better at sharing insights

    1. Photo of Chris Jacquet

      Chris Jacquet

      Vice President and Chief Information Security Officer, Hitachi Vantara

  17. Cybersecurity Outsourcing: Unnecessary Cost or Clever Investment?

    What considerations should orgs have around outsourcing their security?

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  18. Three Years of GDPR: The Journey So Far and the Road Ahead

    What has been the impact of the GDPR so far, both positive and negative?

    1. Photo of Vanya Rakesh

      Vanya Rakesh

      privacy and security consultant, CRANIUM

  19. Three Years Later: Tips for Sustaining GDPR Compliance

    What do orgs need to do to adhere to GDPR standards?

    1. Photo of Dave Wagner

      Dave Wagner

      president and CEO, Zix

  20. What Does the Biden Administration’s Cybersecurity Executive Order Mean for Your Organization?

    Biden's executive order is likely to become a "north star" for security expectations

    1. Photo of Adam Isles

      Adam Isles

      principal, The Chertoff Group

    2. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

What’s Hot on Infosecurity Magazine?