Infosecurity Opinions

  1. Ransomware: How it Has Evolved to be Faster, Stealthier and to Strike Harder

    How have ransomware attacks evolved over the past year?

    1. Photo of Raymond Pompon

      Raymond Pompon

      Director, F5 Labs

  2. #HowTo: Implement Zero-Trust into IoT Security

    How can orgs ensure the surge in IoT devices used by employees is secure?

    1. Photo of Jason Mical

      Jason Mical

      Global Cybersecurity Evangelist, Devo

  3. Cybersecurity State Power Struggles

    Security focus must shift from stopping malicious access to protecting data itself

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  4. Transforming Security Strategies in Times of Uncertainty

    The pandemic will not be the last disruption to security planning

    1. Photo of Israel Barak

      Israel Barak

      CISO, Cybereason

  5. Communication is Crucial in the Fight Against Phishing Scams

    What communication strategies should orgs employ to mitigate against the risk of phishing scams?

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  6. Securing Critical National Infrastructure: The Top Four Obstacles to Overcome

    Why is securing CNI such a challenge and how you can build your strategy for this effort?

    1. Photo of Zane Blomgren

      Zane Blomgren

      senior security engineer, Tripwire

    2. Photo of Dean Ferrando

      Dean Ferrando

      systems engineering manager, Tripwire

  7. The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay

    What are the main tricks being pulled by cyber-criminals to lure victims?

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  8. #WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies

    Orgs must develop proper backup and recovery strategies now

    1. Photo of Ryan Crompton

      Ryan Crompton

      Senior Product Manager, Carbonite

  9. #WorldBackupDay: How to Protect the Last Line of Defense

    How can orgs ensure their backups are safe?

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  10. Software-Defined Telecommunications and the Risk of DDoS

    What will be the security risks associated with 5G telecoms and its associated architecture?

    1. Photo of Sam Cohen

      Sam Cohen

      Cybersecurity Consultant, Deloitte

  11. #HowTo: Use Marketing Principles to Gain Employee Buy-In and Results

    Can marketing principles enhance security awareness training?

    1. Photo of Ashley Rose

      Ashley Rose

      CEO, Living Security

  12. How Behavioral Biometrics is Combating Credential Stuffing Attacks

    Can biometrics mitigate bad cybersecurity behaviors?

    1. Photo of Anton Klippmark

      Anton Klippmark

      Product Manager, BehavioSec

  13. Was it a Breach or Credential Stuffing? The Difference Matters

    It's important for victims to recognize the difference between breaches and credential stuffing attacks to respond appropriately

    1. Photo of Olivia Fryt

      Olivia Fryt

      senior security researcher, SpyCloud

  14. Re-engineering Cyber-Consciousness of the Human Element of Cybersecurity

    How can orgs quantify the human element of cybersecurity?

    1. Photo of Saket Modi

      Saket Modi

      Co-founder and CEO, Lucideus

  15. #HowTo: Optimize Certificate Management to Identify and Control Risk

    How should orgs approach certificate management in a distributed workforce?

    1. Photo of Tim Callan

      Tim Callan

      Chief Compliance Officer, Sectigo

  16. Vaccine Misinformation Campaigns Are in Overdrive

    How should organizations help staff detect misinformation campaigns?

    1. Photo of Jason Meller

      Jason Meller

      CEO & Founder, Kolide

  17. Cloud Security Innovation in 2021: Key Trends

    Substantial improvements in cloud security are expected this year and beyond

  18. The Road to Autonomous Security

    Does the automobile industry show the way forward for autonomous security?

    1. Photo of David Pearson

      David Pearson

      Principal Threat Researcher, Awake Security

  19. #HowTo: Navigate Your Cyber-Posture as a Startup

    How should startups go about implementing an initial security program?

    1. Photo of Ray Kruck

      Ray Kruck

      CEO, TugBoat Logic

  20. Deciphering the Right Type of Encryption for Enterprise Cloud Compliance

    What is the most appropriate type of data encryption for your organization?

    1. Photo of Balaji Ganesan

      Balaji Ganesan

      CEO and co-founder, Privacera

What’s Hot on Infosecurity Magazine?