Infosecurity Opinions

  1. What Will Enterprise Security Look Like After COVID-19?

    Orgs need to focus on securing the digital shift during COVID-19

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  2. #HowTo: Secure Your Applications in a Dynamic, Cloud Native Environment

    How can orgs get the most from cloud-native environments and agile delivery?

    1. Photo of Andreas Lehofer

      Andreas Lehofer

      chief product officer, Dynatrace

  3. Biden’s Executive Order: The Inclusivity Imperative

    The US government needs to address full inclusivity to implement Biden's recent cybersecurity Executive Order

    1. Photo of Michael Oldham

      Michael Oldham

      CEO, PortSys

  4. Why it’s Time to Adopt a CISO Code of Conduct

    CISOs need to get much better at sharing insights

    1. Photo of Chris Jacquet

      Chris Jacquet

      Vice President and Chief Information Security Officer, Hitachi Vantara

  5. Cybersecurity Outsourcing: Unnecessary Cost or Clever Investment?

    What considerations should orgs have around outsourcing their security?

    1. Photo of Rick Jones

      Rick Jones

      CEO and co-founder, DigitalXRAID

  6. Three Years of GDPR: The Journey So Far and the Road Ahead

    What has been the impact of the GDPR so far, both positive and negative?

    1. Photo of Vanya Rakesh

      Vanya Rakesh

      privacy and security consultant, CRANIUM

  7. Three Years Later: Tips for Sustaining GDPR Compliance

    What do orgs need to do to adhere to GDPR standards?

    1. Photo of Dave Wagner

      Dave Wagner

      president and CEO, Zix

  8. What Does the Biden Administration’s Cybersecurity Executive Order Mean for Your Organization?

    Biden's executive order is likely to become a "north star" for security expectations

    1. Photo of Adam Isles

      Adam Isles

      principal, The Chertoff Group

    2. Photo of Tim Mackey

      Tim Mackey

      Principle Security Strategist, Synopsys

  9. #HowTo: Steer Clear of a Ransomware Attack

    Following a surge in ransomware incidents, organizations must be prepared to fend off this type of attack

    1. Photo of Jerry Nguyen

      Jerry Nguyen

      director of threat intelligence and rapid response, Nuspire

  10. The Future of Cybersecurity is User Experience

    Cybersecurity products will need to marry functionality with ease of use

    1. Photo of Kim Mirazimi

      Kim Mirazimi

      vice president for the technology portfolio, 3Pillar Global

  11. Maintaining Secure and Resilient Clouds in Turbulent Times

    There has never been a more critical time for organizations to ensure the efficiency and stability of their cloud-based IT

    1. Photo of Chris Bairstow

      Chris Bairstow

      director of EMEA sales, Virtustream

  12. Why is Ransomware Still So Successful?

    How can we eliminate the scourge of ransomware once and for all?

    1. Photo of Nicolas Casimir

      Nicolas Casimir

      CISO, EMEA, Zscaler

  13. Online Harms - Damned if They Do, Damned if They Don’t?

    Will the UK's proposed online harms legislation end up satisfying no one?

    1. Photo of Greta Barkle

      Greta Barkle

      associate, BCL Solicitors

    2. Photo of Guevara Leacock

      Guevara Leacock

      legal assistant, BCL Solicitors

  14. Armoring the VDI to Protect Business Critical Applications and Data

    VDI platforms provide secure remote access for enterprises, but they are not foolproof if the devices used to access them are unmanaged

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  15. #HowTo: Secure Your Business with Smart Spending

    Organizations should take a more strategic approach to security spending in the current threat landscape

    1. Photo of Adam Philpott

      Adam Philpott

      EMEA President, McAfee

  16. Ransomware: Survive by Outrunning the Guy Next to You

    How can orgs avoid incidents like the recent ransomware attack on a US pipeline?

    1. Photo of Allie Mellen

      Allie Mellen

      analyst, Forrester

  17. Governments and Organizations Can’t Ignore Threats Posed by Disinformation

    How can governments and businesses combat the scourge of disinformation online?

    1. Photo of Stuart Taylor

      Stuart Taylor

      senior director, Forcepoint

  18. Top Five Challenges of Building an Identity Governance Strategy

    How can orgs build an effective identity governance strategy?

    1. Photo of Jackson Shaw

      Jackson Shaw

      chief strategy officer, Clear Skye

  19. Avoid Being a Headline: Not all Domain Registrars are Created Equal

    Amid third-party security threats, brands need to look carefully at their domain registrars

    1. Photo of Vincent D'Angelo

      Vincent D'Angelo

      global director, strategic alliances, Digital Brand Services Division, CSC

  20. Can Organizations Ever Reach a State of Zero Trust?

    Zero trust is not a security solution - it's a state of mind

    1. Photo of Dr Zulfikar Ramzan

      Dr Zulfikar Ramzan

      chief digital officer, RSA Security

What’s Hot on Infosecurity Magazine?