Infosecurity Opinions

  1. How to Bridge the IT and Cyber Skills Gap in 2021

    Educational programs must adapt to address the cyber skills gap

    1. Photo of Gil Adani

      Gil Adani

      CEO, HackerU

    2. Photo of Arnon Shiboleth

      Arnon Shiboleth

      Co-CEO, Prytek

  2. Making PCI Compliance a Good Habit

    What causes a company’s compliance to slip, after the all-important first audit?

    1. Photo of Innes French

      Innes French

      Data Protection Officer, PCI Pal

  3. Five Common Excuses for Lack of Firmware Security

    No one should assume their firmware is already secure – it is an ongoing process.

    1. Photo of Sergej Epp

      Sergej Epp

      Chief Security Officer, Central Europe, Palo Alto Networks

  4. SAD Reality for DNS

    This time it's SAD, in more ways than one

    1. Photo of Dana Iskoldski

      Dana Iskoldski

      Corporate Communications Manager for BlueCat

  5. How to Transform Your Cybersecurity Posture

    Not only does security by design lift your profits, it also places them on footing that’s stable.

    1. Photo of Michael Coden

      Michael Coden

      Head of the cybersecurity practice at BCG Platinion

  6. “What About Cybersecurity?” Best Practices for Secure IIoT Wireless Sensor Deployment

    Some of the most common questions I hear about securing IIoT sensor systems, and some recommendations

    1. Photo of Ray Almgren

      Ray Almgren

      CEO, Swift Sensors

  7. Automation for Better or Worse in 2021

    Automation will drive a tidal wave of spear phishing but will also help cloud hosting providers to crack down on phishing and other malicious activities

    1. Photo of Corey Nachreiner

      Corey Nachreiner

      CTO, WatchGuard Technologies

  8. The Coronavirus Pandemic is Widening the Cybersecurity Skills Gap

    COVID-19 is challenging us and exposing flaws that we have avoided dealing with for some time now

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  9. Be a Hacker in Ten Minutes With No Expertise Required

    Credential stuffing isn’t just a problem for individual victims, it’s a big problem for businesses too.

    1. Photo of Andy Still

      Andy Still

      CTO, Netacea

  10. What Does 2021 Hold for Cybersecurity?

    Even once the COVID-19 pandemic is finally in the rear-view mirror, it’s unlikely related trends will reverse

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  11. Maintaining Control Over Your Security Infrastructure in a Multi-Cloud World

    Why is it important for organizations to retain control of the keys?

    1. Photo of David Close

      David Close

      Chief solutions architect, Futurex

  12. Protecting Your Online Services From DDoS Attacks

    Practical advice and real experiences of surviving DDoS attacks

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  13. Developers are in the Driver’s Seat: What Does it Mean for Security?

    In this evolving model, security takes on a consultative role for developers focusing on policy, governance, and oversight

    1. Photo of Chris Wysopal

      Chris Wysopal

      CTO, Veracode

  14. The World Has Changed - Here’s How to Get the Board to Realize It

    Enterprise IT has changed dramatically in the last year, but that doesn't mean that the conversation has changed the boardroom.

    1. Photo of Jamie Moles

      Jamie Moles

      Senior Security Engineer, Extrahop

  15. Think Like an Attacker: Effectively Addressing Targeted Phishing and Fraud

    With threat activity continuing to rise, it’s crucial that organizations stay vigilant in identifying and remediating threats posed to them.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  16. Keeping Up With the Uncertainty of Shifting Global Data Protection Regulations

    Examining some of the biggest changes seen in 2020, what the next year holds for businesses, and how organizations can remain compliant across the world.

    1. Photo of Chris Strand

      Chris Strand

      Chief Compliance Officer at IntSights

  17. Protecting Asia Pacific Businesses’ Online Presence

    Security concerns, local requirements and regulatory issues are just some of the domain management challenges companies are facing in the region.

    1. Photo of Statton Hammock

      Statton Hammock

      head of IP strategy, government & industry relations at Clarivate

    2. Photo of Heidi Zhang

      Heidi Zhang

      Manager of government and industry relations at Clarivate

  18. 3-2-1, No Thank You

    It is always the data owner’s responsibility to keep copies of their data.

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  19. Preparing for Disaster: How UK Healthcare can Ready Itself For a Ransomware Onslaught

    UK healthcare need to build on best practices to help with prevention, enhancing resilience and rapid threat detection and response

    1. Photo of Peter Beardmore

      Peter Beardmore

      Director, Digital Risk Strategy at RSA Security

  20. What the NIST Framework Misses About Cloud Security

    The four things the NIST framework misses, and one that is spot on

    1. Photo of Doug Hazelman

      Doug Hazelman

      VP, CoreView

What’s Hot on Infosecurity Magazine?