Infosecurity Opinions

  1. The Convergence of Ransomware and Public Relations

    Have a plan in place that outlines how you will handle a ransomware incident

    1. Photo of Meredith Griffanti

      Meredith Griffanti

      Managing Director, Washington, DC, FTI Consulting

    2. Photo of Evan Roberts

      Evan Roberts

      Senior Director, New York, FTI Consulting

  2. Defend Yourself Against Dark Data

    How can you protect your company against dark data?

    1. Photo of Amar Kanagaraj

      Amar Kanagaraj

      Founder & CEO, oneDPO

  3. Close the Online Trust Gap With Identity Proofing

    The goal is to balance a better customer experience with a strong company position.

    1. Photo of Ryan Alexander

      Ryan Alexander

      VP of Fraud Product Management at Prove

  4. BYOD and Enterprise Apps: Balancing Security and Employee Privacy

    IT needs to protect data without compromising employee privacy.

    1. Photo of Tom Tovar

      Tom Tovar

      CEO and co-creator of Appdome

  5. Why I’m Not Sold on Autonomous Security

    Can ML-powered IDS become a fully autonomous network defense?

    1. Photo of Dr. David Brumley

      Dr. David Brumley

      CEO and co-founder, ForAllSecure

  6. #HowTo Adopt an Identity-Centric Security Approach

    A forward-thinking company uses an identity-centric security approach to reduce the risk of a breach or failed audit

    1. Photo of Stephen Lee

      Stephen Lee

      Vice President, Technical Strategy & Partnerships, Okta

  7. The Secure SD-WANderful Approach to Securing Your Workers at Home and in the Office

    Secure SD-WAN provides the scalability, performance, and security necessary to make sure this flexibility is a reality.

    1. Photo of Michael Wood

      Michael Wood

      CMO, Versa Networks

  8. Redefine the Risk Dynamic Within Your Business to Enhance Innovation And Development

    Redefine how your business sees risk, and create a predictable model for investing in risk-reduction that accelerates speed-to-market

    1. Russell Coleman

      EMEA Sales Manager, HackerOne

  9. Key Management with Acuity: On-Premises, Cloud, Hybrid

    Sophisticated key management solutions are essential to any cryptographic operation

    1. Photo of Adam Cason

      Adam Cason

      vice president, global and strategic alliances, Futurex

  10. How to Organize Employees to Cooperate in Threat Mitigation

    Cooperation is important for mitigating cybersecurity threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  11. Why Storytelling Should be at the Heart of Security Training

    The answer to engaging awareness content lies in storytelling

    1. Photo of Simeon Quarrie

      Simeon Quarrie

      founder and CEO of VIVIDA

  12. It’s Time to Fight Back and Protect our Critical Infrastructure

    We are still in the throes of a pandemic, but it should be an imperative to get your data back under control.

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  13. IoT Security: Everything Starts with Awareness #NCSAM

    Is one month enough time to plant the right cybersecurity seeds and make an impact within the IoT community?

    1. Photo of Don Schleede

      Don Schleede

      Information Security Officer at Digi International

  14. The Threat From Within – A Genuine Horror Story

    Which steps you can take to ensure security doesn't give you a fright this Halloween

    1. Photo of Rashid Ali

      Rashid Ali

      Enterprise Sales Manager, UKI & Nordics, Wallix

  15. Security Threats Facing Universities

    Universities weakened by COVID impact can be easy prey for cyber-attack; it’s time to fight back

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

  16. The Case for a Federated Responsibility Model for Application Security to Power Secure DevOps

    Centralized control model no longer applies to today’s software-defined world

    1. Joanne Godfrey

      Security Evangelist, ZeroNorth

  17. Information Security in Agile Development

    Changes to be made to support the transformation of software development within an Agile framework.

    1. Photo of Gerald  Pang

      Gerald Pang

      Information Risk Manager

  18. Why Does The Software Defined Perimeter (SDP) Matter?

    Organizations using hosting options should use a VPN and SDP to ensure security and a positive user experience

    1. Photo of Achi Lewis

      Achi Lewis

      EMEA Director for NetMotion

  19. #HowTo Enhance Borderless Networks with Cloud-Managed DDI #NCSAM

    Flexible organizations require a flexible solution

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  20. Why Your CSPM Might Be Falling Short

    Why the traditional CSPM model falls short within cloud-native organizations

    1. Photo of Idan Tendler

      Idan Tendler

      Co-founder and CEO, Bridgecrew

What’s Hot on Infosecurity Magazine?