Infosecurity Opinions

  1. Three Questions to Consider to Help Mitigate Against Supply Chain Attacks

    How should orgs assess current approaches to mitigate against supply chain attacks?

    1. Photo of John Faber

      John Faber

      Senior Consultant, Booz Allen

  2. Taxed and Hacked: How Your Company Could Be at Risk This Tax Season

    What are types of tactics used by cyber-criminals during tax season, and how can orgs protect themselves proactively?

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  3. Outlier Detection Techniques for Fraud

    Data science techniques can help detect credit card fraud

    1. Photo of Rosaria Silipo

      Rosaria Silipo

      principal data scientist, KNIME

    2. Photo of Maarit Widmann

      Maarit Widmann

      junior data scientist, KNIME

  4. What if we Gave Users Control of Their Own Digital Identity?

    How can users be put back in control of their digital identities?

    1. Photo of Armin Ebrahimi

      Armin Ebrahimi

      Head of Distributed Identity, Ping Identity

  5. Personal Security IS Enterprise Security

    Helping employees stay safe in their personal lives will translate into work

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  6. #HowTo: Protect Your Employees from Data Loss

    How should orgs tackle insider risk amid the shift to remote working?

    1. Photo of Tony Pepper

      Tony Pepper

      CEO, Egress

  7. How Cyber-Attack Automation Turned SMEs into Sitting Ducks: And How to Change This

    SMEs need to take a new approach to protecting themselves from cyber-attacks

    1. Photo of Liron Barak

      Liron Barak

      CEO and Co-Founder of BitDam

  8. CSP & Magecart Web Skimmers: Facts and Fiction

    It is important for e-commerce providers to fully understand the evolution of Magecart attacks

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  9. How Secure Are Healthcare IT Systems? New Research Provides a Glimpse

    How can healthcare orgs make themselves more secure amid rising attacks?

    1. Photo of Ed Bellis

      Ed Bellis

      Co-founder and CTO, Kenna Security

  10. The Case For and Against Criminalizing Ransomware

    What are the main issues surrounding ransomware payments?

    1. Photo of Stuart Reed

      Stuart Reed

      UK Director, Orange Cyberdefense

  11. Today's Arms Race: The Fight for Vaccine Appointments Between Humans and Bots

    Vaccine distributors need to counter the use of bots exploiting the vaccine appointment process

    1. Photo of Jason Kent

      Jason Kent

      Hacker In Residence, Cequence Security

  12. HowTo: Improve Your Security Team’s Remediation Efficiency

    What are the key steps to developing a risk-based vulnerability management strategy?

    1. Photo of Simon Roe

      Simon Roe

      Application Security Product Manager, Outpost24

  13. Encrypted Data in the Cloud

    Encryption will be vital in preventing data breaches in the cloud

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  14. Understanding Education and Certifications to Help Find Your Path in Cybersecurity

    There's a need for clarity on options for career pathways for those wanting to enter the cybersecurity industry

    1. Photo of Jason Lawrence

      Jason Lawrence

      principal architect, AT&T Cybersecurity

  15. Tax Season is in Full Swing and so is Unemployment Fraud

    With the tax season in full swing, protecting against financial fraud is vital

    1. Photo of Tom Kelly

      Tom Kelly

      President and CEO, IDX

  16. Vital Signs: Why Service Monitoring is a Key Step in Effective IoT Cybersecurity

    Should we consider service monitoring as the foundation to IoT security?

    1. Photo of Pilgrim Beart

      Pilgrim Beart

      CEO, DevicePilot

  17. Promoting a Cultural Shift for Cybersecurity

    Developing a good security culture will reduce the risk of scams

    1. Photo of Tim Helming

      Tim Helming

      Director of Product Management, DomainTools

  18. #HowTo: Stop Hackers Targeting Your Home

    How can organizations defend their remote workforce from hackers?

    1. Photo of Alissa Knight

      Alissa Knight

      Group CEO at Brier & Thorn, Partner at Knight Ink and Principal Analyst

  19. It’s Time to Captivate the Next Generation of Cybersecurity Professionals

    With the rise in cyber-attacks, there has never been a better time to encourage students to enrol on cybersecurity courses

    1. Photo of Dr Vahid Heydari

      Dr Vahid Heydari

      Cybersecurity Course Leader, Staffordshire University

  20. Firewall and Malware Challenges for Virtualized Telecom Networks

    How can service providers defend against attacks targeting virtualized telecom networks

    1. Photo of Sam Cohen

      Sam Cohen

      Cybersecurity Consultant, Deloitte

What’s Hot on Infosecurity Magazine?