Infosecurity Opinions

  1. Don’t Cut Corners while Running LAPS

    Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.

  2. The Cyber Sleeper Cells Lying in Wait for the Return to the Office

    Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  3. Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?

    There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  4. The Ongoing Threat of Telecoms Fraud

    It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.

    1. Photo of Jimmy Jones

      Jimmy Jones

      telecoms cyber security expert at Positive Technologies

  5. Overcoming Healthcare’s Cybersecurity Challenges

    Six recommendations for improving cybersecurity in healthcare

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  6. Partitioned Endpoints Pair Security with Convenience for Home Working

    An endpoint architecture to enable safe, secure and productive home working.

    1. Photo of Ian Ferguson

      Ian Ferguson

      VP Marketing and Strategic Alliances at Lynx Software Technologies

  7. #CyberMonday Risks of a Locked-Down Festive Period for Online Retailers

    It’s highly likely that retailers will still be relying heavily on their online operations to make much needed sales before Christmas.

    1. Photo of David Dickson

      David Dickson

      Head of Enterprise at Superscript

  8. 2020 Was the Year of the Great VPN Comeback, or Was It?

    In this era of remote and mobile work, legacy, hardware-based VPNs have passed their prime

    1. Photo of John Knopf

      John Knopf

      SVP of Product Strategy at NetMotion

  9. Bot is the New Black (Friday): How Retailers Can Fight Back

    Black Friday isn’t only time retailers have to worry about automated shopping bots

    1. Photo of Ameya Talwalker

      Ameya Talwalker

      co-founder Cequence Security

  10. Why Twitter’s High-Profile Users Need to Personally Embrace Security

    This is an indication of the importance Twitter holds to those in the higher ranks of society.

    1. Photo of Niamh Muldoon

      Niamh Muldoon

      senior director of trust and security at OneLogin

  11. Authenticate and Survive – Why Current Options Are Better than Ever

    As employees gain more access to important information, the need for greater security increases.

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  12. Stop Punching in the Dark

    The blind spot of visibility is not only going unaddressed, it’s getting bigger and bigger

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  13. Cyber Resilience During Times of Uncertainty

    A cyber resilience approach is based on the premise of organizing defenses to prioritize resiliency over security to keep your business going

    1. Photo of Tom Patterson

      Tom Patterson

      Chief Trust Officer, Unisys

  14. #HowTo Master Cybersecurity Training with a Third Party

    Without specialist in-house teams, staying on top of cybersecurity matters is a challenge for SMBs

    1. Photo of Jay Ryerse

      Jay Ryerse

      CISSP, VP of Cybersecurity Initiatives at ConnectWise

  15. What Can We Learn About Cybersecurity From the 2020 Elections?

    Lessons learned from this election, and for what can be utilized in the future

    1. Photo of Yotam Gutman

      Yotam Gutman

      Marketing Director at SentinelOne, SentinelOne

  16. Why Don’t You Have a Certificate Manager?

    Certificate management is important and few enterprises have the necessary talent and expertise to do the job

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  17. Countering Threat Data Overload: The Importance of Curation

    Why data curation is the future of threat intelligence

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  18. Proactively and Securely Reducing Your Organization’s Data Footprint

    Active data erasure is one aspect that is essential.

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  19. The Need for Continuous Authentication

    Implementation of continuous authentication schemes should be transparent to employees

    1. Photo of Sid Potbhare

      Sid Potbhare

      CEO at Untethered Labs

  20. Why Cybersecurity isn’t What You Think it is

    Are we all becoming cybersecurity snobs?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

What’s Hot on Infosecurity Magazine?