Infosecurity Opinions

  1. #HowTo: Optimize Your 2021 Security Spend

    How do you reduce your security risk with tightened budgets?

    1. Photo of Tony Velleca

      Tony Velleca

      CEO, Cyberproof and CISO, UST Global

  2. Security from the White House

    How President-elect Joe Biden can tackle a challenging cybersecurity landscape.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  3. From BIAS to Sweyntooth: Eight Bluetooth Threats to Network Security

    Bluetooth has a history of vulnerabilities that continues to put corporations at risk of a major security breach

    1. Photo of Bob Baxley

      Bob Baxley

      CTO at Bastille Networks

  4. #HowTo Write the Perfect Op-Ed, and Get it Published!

    Outgoing deputy editor Dan Raywood offers advice on how to produce the perfect opinion article

  5. Credential Stuffing – Are You Doing Enough?

    Why an old style attack just will not go away.

    1. Photo of Stuart Jubb

      Stuart Jubb

      Head of consulting at Crossword Cybersecurity

  6. Financial Services Industry Under Attack from a Surge in Credential Stuffing

    Compromised credentials are a threat to multiple sites when a data breach occurs

    1. Photo of Mike Wilson

      Mike Wilson

      Founder & CTO, Enzoic

  7. Is it Time to Rethink Cybersecurity Training?

    What businesses can do to engage/educate their employees more effectively.

    1. Photo of Richard Cassidy

      Richard Cassidy

      Vice President of Global Technology, Securonix

  8. Combating the Rising Cyber Threat Against ICS

    ICS systems face a continual threat of attack, and the risk is growing

    1. Photo of Amir Preminger

      Amir Preminger

      VP Research at Claroty

  9. #HowTo Support a Zero Trust Model with Automation

    How security and IT operations teams can implement Zero Trust and improve the security posture across hybrid cloud infrastructures.

    1. Photo of Massimo Ferrari

      Massimo Ferrari

      Consulting Product Manager at Red Hat

  10. Is it Time for the Network to Shoulder More of the Burden of Information Security?

    It’s time ISPs became allies rather than observers

    1. Photo of Keith O'Byrne

      Keith O'Byrne

      Head of Solutions, Asavie

  11. Security Initiatives Businesses Must Adopt to Survive in This New World

    If organizations fail to adapt to this new reality, it could leave them unable to pivot quickly

    1. Photo of Chris Harris

      Chris Harris

      EMEA technical director, Thales

  12. Decrypting Diversity and Inclusion in Cybersecurity

    How to improve awareness of opportunities for women and help sustain from STEM to the workforce

    1. Photo of Kevin Stenson

      Kevin Stenson

      Chief Executive at The Smallpeice Trust

  13. The Unintended Data Security Consequences of Remote Collaboration

    Every Team or chat created is yet another potential exit point for sensitive data.

    1. Photo of Dave Henderson

      Dave Henderson

      Co-founder BlueFort Security

  14. Using Security Automation to Stay a Step Ahead in these Challenging Times

    How to use automation throughout security efforts to better focus resources and build assurance into security controls and operations

    1. Photo of Mike Mellor

      Mike Mellor

      Head of Security for the Digital Experience business, Adobe

  15. #HowTo Create a Hybrid Remote and Office Work Model

    Five ways IT and security managers can plan for a hybrid work model

    1. Photo of Sagi  Gidali

      Sagi Gidali

      Co-Founder and CPO at Perimeter 81

  16. Don’t Cut Corners while Running LAPS

    Microsoft’s Local Administrator Password Solution (LAPS) has the basics covered, but not much more.

  17. The Cyber Sleeper Cells Lying in Wait for the Return to the Office

    Workers returning to the office could be unwittingly connecting to the corporate network with covertly compromised devices

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  18. Death, Destruction and Rigged Elections: The New Reality of Today’s Cyber Threats?

    There is a disturbing trend in nation-state and ransomware attacks to attempt real world physical harm

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  19. The Ongoing Threat of Telecoms Fraud

    It’s vital that operators remain aware of the vulnerabilities in their networks, and how they can be exploited.

    1. Photo of Jimmy Jones

      Jimmy Jones

      telecoms cyber security expert at Positive Technologies

  20. Overcoming Healthcare’s Cybersecurity Challenges

    Six recommendations for improving cybersecurity in healthcare

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

What’s Hot on Infosecurity Magazine?