Infosecurity Opinions

  1. What's New in the EU's Updated Standard Contractual Clauses?

    Organizations transferring data to and from the EU will need to be aware of updated standard contractual clauses

    1. Photo of David Dumont

      David Dumont

      partner, Hunton Andrews Kurth LLP

    2. Photo of Bridget Treacy

      Bridget Treacy

      partner, Hunton Andrews Kurth LLP

  2. Is the "Cyber Skills Shortage" a Misnomer?

    If firms can’t hire for the roles they advertise, it doesn’t follow that there is a cyber skills shortage

    1. Photo of Dr Leila Powell

      Dr Leila Powell

      lead data scientist, Panaseer

  3. #HowTo: Approach Identity Management

    To support identity effectively, we have to implement processes that use standards and embrace technologies

    1. Photo of Greg Keller

      Greg Keller

      CTO, JumpCloud

  4. Fileless Attacks: Addressing Evolving Malware Threats

    Organizations must consider fileless malware threats as well as traditional approaches

    1. Photo of Eric Barnes

      Eric Barnes

      cyber services architect, Integrity360

  5. What We Can Learn from Recent High Profile Cyber Attacks?

    What actions should organisations take to improve their security amid rising and more sophisticated threats?

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  6. Proactive Security Key to Combatting Supply Chain Attacks

    What lessons can be learned from the recent Air India data breach?

    1. Photo of Robert Fitzsimons

      Robert Fitzsimons

      product manager, Telesoft Technologies

  7. How Innovation Powered by Privacy Can Eliminate Data Waste

    Organizations need to embrace a privacy mindset to use data successfully

    1. Photo of Michael Ingrassia

      Michael Ingrassia

      president and general counsel, Truata

  8. What Will Enterprise Security Look Like After COVID-19?

    Orgs need to focus on securing the digital shift during COVID-19

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  9. #HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment

    How can orgs get the most from cloud-native environments and agile delivery?

    1. Photo of Andreas Lehofer

      Andreas Lehofer

      chief product officer, Dynatrace

  10. Biden’s Executive Order: The Inclusivity Imperative

    The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order

    1. Photo of Michael Oldham

      Michael Oldham

      CEO, PortSys

  11. Why it’s Time to Adopt a CISO Code of Conduct

    CISOs need to get much better at sharing insights

    1. Photo of Chris Jacquet

      Chris Jacquet

      Vice President and Chief Information Security Officer, Hitachi Vantara

  12. Cybersecurity Outsourcing: Unnecessary Cost or Clever Investment?

    What considerations should orgs have around outsourcing their security?

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  13. Three Years of GDPR: The Journey So Far and the Road Ahead

    What has been the impact of the GDPR so far, both positive and negative?

    1. Photo of Vanya Rakesh

      Vanya Rakesh

      privacy and security consultant, CRANIUM

  14. Three Years Later: Tips for Sustaining GDPR Compliance

    What do orgs need to do to adhere to GDPR standards?

    1. Photo of Dave Wagner

      Dave Wagner

      president and CEO, Zix

  15. What Does the Biden Administration’s Cybersecurity Executive Order Mean for Your Organization?

    Biden's executive order is likely to become a "north star" for security expectations

    1. Photo of Adam Isles

      Adam Isles

      principal, The Chertoff Group

    2. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  16. #HowTo: Steer Clear of a Ransomware Attack

    Following a surge in ransomware incidents, organizations must be prepared to fend off this type of attack

    1. Photo of Jerry Nguyen

      Jerry Nguyen

      director of threat intelligence and rapid response, Nuspire

  17. The Future of Cybersecurity is User Experience

    Cybersecurity products will need to marry functionality with ease of use

    1. Photo of Kim Mirazimi

      Kim Mirazimi

      vice president for the technology portfolio, 3Pillar Global

  18. Maintaining Secure and Resilient Clouds in Turbulent Times

    There has never been a more critical time for organizations to ensure the efficiency and stability of their cloud-based IT

    1. Photo of Chris Bairstow

      Chris Bairstow

      director of EMEA sales, Virtustream

  19. Why is Ransomware Still So Successful?

    How can we eliminate the scourge of ransomware once and for all?

    1. Photo of Nicolas Casimir

      Nicolas Casimir

      CISO, EMEA, Zscaler

  20. Online Harms - Damned if They Do, Damned if They Don’t?

    Will the UK's proposed online harms legislation end up satisfying no one?

    1. Photo of Greta Barkle

      Greta Barkle

      associate, BCL Solicitors

    2. Photo of Guevara Leacock

      Guevara Leacock

      legal assistant, BCL Solicitors

What’s Hot on Infosecurity Magazine?