Infosecurity Opinions

  1. The State of Kubernetes and Docker Security in 2021

    Attacks on Docker and Kubernetes environments are set to grow in sophistication

    1. Photo of Rani Osnat

      Rani Osnat

      VP Strategy, Aqua Security

  2. Who (or What) is Your Physical Access Control System Letting in?

    Organizations need to pay closer attention to the risk profile of the vendors they work with

    1. Photo of Paul Dodds

      Paul Dodds

      Country Manager – UK & Ireland, Genetec

  3. The Human Cost of Social Engineering

    Organizations must be mindful of the emotional impacts of cybersecurity

    1. Photo of Gemma Moore

      Gemma Moore

      Director, Cyberis

  4. Making this Year Better for Cybersecurity

    How can the lessons of 2020 be taken into this year?

    1. Photo of Liviu  Arsene

      Liviu Arsene

      Senior E-Threat Analyst, Bitdefender

  5. Why 2021 Can be a Year to Change the Trajectory of Cyber Adversaries

    Why increased collaboration between red and blue teams is key to enhancing orgs security

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  6. Cybersecurity: Prevention Better than Cure

    By the time you need to change behavior, it’s often already too late

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  7. Brief Overview on Payment Card Security in New Zealand

    What are the security control options for card payments in New Zealand?

    1. Photo of Henry  Hon

      Henry Hon

      Manager (Cyber Defense), KPMG

  8. #HowTo: Protect Your Organization’s Web Apps

    How can web log analytics help secure web apps?

    1. Photo of Onkar Birk

      Onkar Birk

      SVP, Product Strategy & Engineering, Alert Logic

  9. Answering the Inherent Cyber-Challenges of Teleoperation

    How can the cybersecurity challenges in the automotive industry be tackled?

    1. Photo of Amit Rosenzweig

      Amit Rosenzweig

      Founder and CEO, Ottopia

  10. 2021: The Year of the QR Code for Digital Health Apps

    Do QR Codes provide effective data security and privacy in the transfer of personal health information?

    1. Photo of Adam Palmer

      Adam Palmer

      Co-CEO, Tento Health

  11. Is $50,000 for a Vulnerability Too Much?

    Should we welcome the rise in payouts for crowdsourced security programs?

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  12. Cybersecurity in Financial Services: Securing the Future of Organizations in the Post-COVID World

    The financial services industry is facing increased cyber-risks

    1. Photo of Rajashekara Maiya

      Rajashekara Maiya

      VP, Global Head-Business Consulting, Finacle at Infosys

  13. Don’t Stand Up Data Protection this #ValentinesDay

    Achieving the perfect security relationship that allows collaboration without compromise

    1. Photo of Nick Turner

      Nick Turner

      VP EMEA, Druva

  14. How to Stay Safe When Playing With Cryptocurrencies

    What have the recent Bitcoin password stories taught us about securing assets?

    1. Photo of Ian Pitt

      Ian Pitt

      CIO, LogMeIn

  15. #WomenInScience: Gender Diversity Key to Well-Rounded Cybersecurity

    Consumer perception, female engagement and the merging of gender norms make women integral for the future of cybersecurity

    1. Photo of Stephanie Schultz

      Stephanie Schultz

      executive director, Trusted Computing Group

  16. The New Economics of Holding Personal Data in 2021

    The cost of data breaches is set to surge in the coming year

    1. Photo of Patrick Walsh

      Patrick Walsh

      CEO, IronCore Labs

  17. #HowTo: Increase Diversity in Security Teams

    What steps should organizations be taking to improve diversity within their security teams?

    1. Photo of Lisa Ventura

      Lisa Ventura

      Founder, Cyber Security Unity

  18. Pandemic Security: What Have We Learned?

    The COVID-19 pandemic has changed the security landscape forever

    1. Photo of Duncan Godfrey

      Duncan Godfrey

      senior director of security, Auth0

    2. Photo of James Seadon

      James Seadon

      partner, Fieldfisher

  19. SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    On-premises identity resources will increasingly be used to attack cloud environments

    1. Photo of Sean Deuby

      Sean Deuby

      director of services, Semperis

  20. Improving Cybersecurity within Higher Education

    Higher education institutions must respond to the increased threats they are facing

    1. Photo of Enzo Brienza

      Enzo Brienza

      sales manager, InterSystems

What’s Hot on Infosecurity Magazine?