Infosecurity Opinions

  1. Securing Critical National Infrastructure: The Top Four Obstacles to Overcome

    Why is securing CNI such a challenge and how you can build your strategy for this effort?

    1. Photo of Zane Blomgren

      Zane Blomgren

      senior security engineer, Tripwire

    2. Photo of Dean Ferrando

      Dean Ferrando

      systems engineering manager, Tripwire

  2. The Latest Methods Cyber-Criminals Are Using to Trick You this #AprilFoolsDay

    What are the main tricks being pulled by cyber-criminals to lure victims?

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  3. #WorldBackupDay: Don’t Wait for Next Big Breach to Enact Proper Data Protection & Recovery Strategies

    Orgs must develop proper backup and recovery strategies now

    1. Photo of Ryan Crompton

      Ryan Crompton

      Senior Product Manager, Carbonite

  4. #WorldBackupDay: How to Protect the Last Line of Defense

    How can orgs ensure their backups are safe?

    1. Photo of Ryan Weeks

      Ryan Weeks

      CISO, Datto

  5. Software-Defined Telecommunications and the Risk of DDoS

    What will be the security risks associated with 5G telecoms and its associated architecture?

    1. Photo of Sam Cohen

      Sam Cohen

      Cybersecurity Consultant, Deloitte

  6. #HowTo: Use Marketing Principles to Gain Employee Buy-In and Results

    Can marketing principles enhance security awareness training?

    1. Photo of Ashley Rose

      Ashley Rose

      CEO, Living Security

  7. How Behavioral Biometrics is Combating Credential Stuffing Attacks

    Can biometrics mitigate bad cybersecurity behaviors?

    1. Photo of Anton Klippmark

      Anton Klippmark

      Product Manager, BehavioSec

  8. Was it a Breach or Credential Stuffing? The Difference Matters

    It's important for victims to recognize the difference between breaches and credential stuffing attacks to respond appropriately

    1. Photo of Olivia Fryt

      Olivia Fryt

      senior security researcher, SpyCloud

  9. Re-engineering Cyber-Consciousness of the Human Element of Cybersecurity

    How can orgs quantify the human element of cybersecurity?

    1. Photo of Saket Modi

      Saket Modi

      Co-founder and CEO, Lucideus

  10. #HowTo: Optimize Certificate Management to Identify and Control Risk

    How should orgs approach certificate management in a distributed workforce?

    1. Photo of Tim Callan

      Tim Callan

      Chief Compliance Officer, Sectigo

  11. Vaccine Misinformation Campaigns Are in Overdrive

    How should organizations help staff detect misinformation campaigns?

    1. Photo of Jason Meller

      Jason Meller

      CEO & Founder, Kolide

  12. Cloud Security Innovation in 2021: Key Trends

    Substantial improvements in cloud security are expected this year and beyond

  13. The Road to Autonomous Security

    Does the automobile industry show the way forward for autonomous security?

    1. Photo of David Pearson

      David Pearson

      Principal Threat Researcher, Awake Security

  14. #HowTo: Navigate Your Cyber-Posture as a Startup

    How should startups go about implementing an initial security program?

    1. Photo of Ray Kruck

      Ray Kruck

      CEO, TugBoat Logic

  15. Deciphering the Right Type of Encryption for Enterprise Cloud Compliance

    What is the most appropriate type of data encryption for your organization?

    1. Photo of Balaji Ganesan

      Balaji Ganesan

      CEO and co-founder, Privacera

  16. The Impact of #COVID19 on Cybersecurity and How Businesses Can Mitigate Risk

    What are the main cybersecurity challenges faced by businesses as a result of COVID-19

    1. Photo of Robin Boldon

      Robin Boldon

      Director Product Management for Anti-Piracy, OpSec Security

  17. A Human Orientated Approach is Essential to Today’s Security Needs

    Why staff are the most important asset in protecting organizations' data

    1. Photo of Mohan Koo

      Mohan Koo

      Co-Founder and CTO, Dtex Systems

  18. #IWD2021: Recruiting More Women is About Much More than Gender Diversity

    Encouraging more women to choose a career in cybersecurity

    1. Photo of Debra Danielson

      Debra Danielson

      CTO & SVP of Engineering, Digital Guardian

  19. #HowTo: Protect E-Commerce Sites from Client-Side Attacks

    What actions should retailers take to protect their sites?

    1. Photo of Dan Dinnar

      Dan Dinnar

      CEO, Source Defense

  20. Cybersecurity Industry Must #ChooseToChallenge on #IWD2021

    Exabeam’s Samantha Humphries outlines the need to address gender bias and inequity

    1. Photo of Sam  Humphries

      Sam Humphries

      Head of Security Strategy EMEA, Exabeam

What’s Hot on Infosecurity Magazine?