Infosecurity Opinions

  1. The Countdown Towards Zero Trust and MFA

    What must Federal agencies do as we approach the deadline for implementing President Biden's executive order on zero trust?

    1. Photo of Dr Bobby Blumofe

      Dr Bobby Blumofe

      chief technology officer, Akamai

  2. The Evolution of Ransomware and How to Move Forward

    Ransomware has evolved significantly over recent years, and governments and businesses need to adapt

    1. Photo of Jim Gogolinski

      Jim Gogolinski

      vice president of research and intelligence, iBoss

  3. Staying On Guard Against Cyber-Attacks

    Can automated breach and attack simulation (ABAS) ensure organizations stay on guard against cyber-attacks?

    1. Photo of John Fedoronko

      John Fedoronko

      vice president of sales – EMEA, ReliaQuest

  4. Understanding and Mitigating Cyber Risk in the Healthcare System

    Cyber-attacks on hospitals can have particularly devastating consequences and security teams must understand this risk to properly plan their responses

    1. Photo of Ronen Lago

      Ronen Lago

      CTO and co-founder, CYE

  5. #HowTo: Be More Resilient Against Ransomware

    Organizations need to start designing their disaster recovery plans with ransomware in mind

    1. Photo of Robert Capps

      Robert Capps

      VP of emerging technologies, NuData Security

  6. Malware-as-a-Service is a Booming Business

    Why is Malware-as-a-Service booming, and what can security teams do to make this tactic less successful?

    1. Photo of Ron Davidson

      Ron Davidson

      VP R&D and CTO, Skybox Security

  7. The Power of Anonymity in Supply Chain Security

    The rise in supply chain attacks should serve as a warning to organizations to update their email security

    1. Photo of Adrien Gendre

      Adrien Gendre

      chief product and services officer, Vade

  8. Going Passwordless: What Are the Benefits For Your Business?

    Given the number of breaches associated with stolen credentials, should orgs go passwordless?

    1. Photo of Steve Whiter

      Steve Whiter

      director, Appurity

  9. How DNS Security Can Help Combat the IoT Challenge

    Domain name system (DNS) can help IT teams protect their network against shadow IT threats

    1. Photo of Keith Glancey

      Keith Glancey

      systems engineering manager, Infoblox

  10. Three Key Elements of a Defense-in-Depth Approach to Phishing

    What are the three elements of a multi-layered, defense-in-depth approach to defending against phishing?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  11. #HowTo: Protect Medical Institutions from Cyber-Attacks

    Attackers are taking advantage of the havoc caused by COVID to infiltrate overstretched hospital systems

    1. Photo of Shimrit Tzur-David

      Shimrit Tzur-David

      CTO of Secret Double Octopus

  12. How Ransomware is Teaming Up with DDoS

    Cybercrime gangs are increasingly combining ransomware with DDoS attacks, to devastating effect

    1. Photo of Sean Newman

      Sean Newman

      vice president, product management, Corero

  13. Data Sovereignty and Privacy Compliance Post Schrems II

    How can organizations remain compliant following the Schrems II decision last year?

    1. Photo of Rob Stubbs

      Rob Stubbs

      product director, Fortanix

  14. Why Enterprise Users Can't Wait for Patch Updates

    Are software patches often little more than a glorified form of Whack-A-Mole?

    1. Photo of Eric Helmer

      Eric Helmer

      chief technology officer, Rimini Street

  15. How Has the Education Sector Adapted to Life in the Cloud?

    Education institutions have faced particular challenges with cloud adoption during COVID-19

    1. Photo of Kieran Nalton

      Kieran Nalton

      senior security consultant, SureCloud

  16. Signs, Causes and Solutions for Network Data Breaches

    What are the common signs and solutions for dealing with network breaches?

    1. Photo of Ali Neil

      Ali Neil

      director of international security solutions, Verizon

  17. #HowTo: Ensure Third Parties Don't Compromise Your Supply Chain

    More disciplined attention is required to make sure third party vendors don't compromise your supply chain

    1. Photo of Gyan Prakash

      Gyan Prakash

      head of information security, Altimetrik

  18. Protecting CNI: It’s About the Collective

    Nominet argues that protecting CNI requires a collaborative approach

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  19. Disengaged Employees Could Become Your Organization's Greatest Security Threat

    Organizations must establish accountability for security to avoid the danger posed by disengaged employees

    1. Photo of Lucas Szymanowski

      Lucas Szymanowski

      director of information security and GRC, Wrike

  20. What Are GDPR's Hidden Benefits Three Years On?

    What should organizations do to ensure they meet GDPR standards on data security and privacy?

    1. Photo of Adam Bird

      Adam Bird

      CEO and co-founder, Cronofy

What’s Hot on Infosecurity Magazine?