Infosecurity Opinions

  1. “What About Cybersecurity?” Best Practices for Secure IIoT Wireless Sensor Deployment

    Some of the most common questions I hear about securing IIoT sensor systems, and some recommendations

    1. Photo of Ray Almgren

      Ray Almgren

      CEO, Swift Sensors

  2. Automation for Better or Worse in 2021

    Automation will drive a tidal wave of spear phishing but will also help cloud hosting providers to crack down on phishing and other malicious activities

    1. Photo of Corey Nachreiner

      Corey Nachreiner

      CTO, WatchGuard Technologies

  3. The Coronavirus Pandemic is Widening the Cybersecurity Skills Gap

    COVID-19 is challenging us and exposing flaws that we have avoided dealing with for some time now

    1. Photo of Ron Bennatan

      Ron Bennatan

      GM of Data Security, Imperva

  4. Be a Hacker in Ten Minutes With No Expertise Required

    Credential stuffing isn’t just a problem for individual victims, it’s a big problem for businesses too.

    1. Photo of Andy Still

      Andy Still

      CTO, Netacea

  5. What Does 2021 Hold for Cybersecurity?

    Even once the COVID-19 pandemic is finally in the rear-view mirror, it’s unlikely related trends will reverse

    1. Photo of Joseph Carson

      Joseph Carson

      Chief Security Scientist & Advisory CISO - Delinea

  6. Maintaining Control Over Your Security Infrastructure in a Multi-Cloud World

    Why is it important for organizations to retain control of the keys?

    1. Photo of David Close

      David Close

      Chief solutions architect, Futurex

  7. Protecting Your Online Services From DDoS Attacks

    Practical advice and real experiences of surviving DDoS attacks

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  8. Developers are in the Driver’s Seat: What Does it Mean for Security?

    In this evolving model, security takes on a consultative role for developers focusing on policy, governance, and oversight

    1. Photo of Chris Wysopal

      Chris Wysopal

      CTO, Veracode

  9. The World Has Changed - Here’s How to Get the Board to Realize It

    Enterprise IT has changed dramatically in the last year, but that doesn't mean that the conversation has changed the boardroom.

    1. Photo of Jamie Moles

      Jamie Moles

      Senior Security Engineer, Extrahop

  10. Think Like an Attacker: Effectively Addressing Targeted Phishing and Fraud

    With threat activity continuing to rise, it’s crucial that organizations stay vigilant in identifying and remediating threats posed to them.

    1. Photo of Zack Allen

      Zack Allen

      Director, Threat Operations, ZeroFOX

  11. Keeping Up With the Uncertainty of Shifting Global Data Protection Regulations

    Examining some of the biggest changes seen in 2020, what the next year holds for businesses, and how organizations can remain compliant across the world.

    1. Photo of Chris Strand

      Chris Strand

      Chief Compliance Officer at IntSights

  12. Protecting Asia Pacific Businesses’ Online Presence

    Security concerns, local requirements and regulatory issues are just some of the domain management challenges companies are facing in the region.

    1. Photo of Statton Hammock

      Statton Hammock

      head of IP strategy, government & industry relations at Clarivate

    2. Photo of Heidi Zhang

      Heidi Zhang

      Manager of government and industry relations at Clarivate

  13. 3-2-1, No Thank You

    It is always the data owner’s responsibility to keep copies of their data.

    1. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

  14. What the NIST Framework Misses About Cloud Security

    The four things the NIST framework misses, and one that is spot on

    1. Photo of Doug Hazelman

      Doug Hazelman

      VP, CoreView

  15. Preparing for Disaster: How UK Healthcare can Ready Itself For a Ransomware Onslaught

    UK healthcare need to build on best practices to help with prevention, enhancing resilience and rapid threat detection and response

    1. Photo of Peter Beardmore

      Peter Beardmore

      Director, Digital Risk Strategy at RSA Security

  16. Why Are More People Not Automating Certificate Management?

    What is scaring enterprises away from automation?

    1. Photo of Avesta Hojjati

      Avesta Hojjati

      Head of R&D, DigiCert

  17. Prevent Ransomware From Taking the Podium With Layered Security

    It’s crucial organizations understand and know how to defend themselves from what is now often a sophisticated, three-stage attack.

    1. Photo of Chris Goettl

      Chris Goettl

      Product Manager, Ivanti

  18. The Three Characteristics of a Defensible Security Program

    Principles to help you continuously improve the effectiveness and efficiency of your security controls

    1. Photo of Tom Scholtz

      Tom Scholtz

      Research VP, Gartner

  19. Automated Penetration Testing – Can it Replace Humans?

    Are human pen testers heading for redundancy, and can we replace them with tools?

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  20. How Should CISOs Combat Rising "Soft" Attacks?

    Defending against the more targeted “soft attack”

    1. Photo of Otavio Freire

      Otavio Freire

      President & CTO, SafeGuard Cyber

What’s Hot on Infosecurity Magazine?