Infosecurity Opinions

  1. Partitioned Endpoints Pair Security with Convenience for Home Working

    An endpoint architecture to enable safe, secure and productive home working.

    1. Photo of Ian Ferguson

      Ian Ferguson

      VP Marketing and Strategic Alliances at Lynx Software Technologies

  2. #CyberMonday Risks of a Locked-Down Festive Period for Online Retailers

    It’s highly likely that retailers will still be relying heavily on their online operations to make much needed sales before Christmas.

    1. Photo of David Dickson

      David Dickson

      Head of Enterprise at Superscript

  3. 2020 Was the Year of the Great VPN Comeback, or Was It?

    In this era of remote and mobile work, legacy, hardware-based VPNs have passed their prime

    1. Photo of John Knopf

      John Knopf

      SVP of Product Strategy at NetMotion

  4. Bot is the New Black (Friday): How Retailers Can Fight Back

    Black Friday isn’t only time retailers have to worry about automated shopping bots

    1. Photo of Ameya Talwalker

      Ameya Talwalker

      co-founder Cequence Security

  5. Why Twitter’s High-Profile Users Need to Personally Embrace Security

    This is an indication of the importance Twitter holds to those in the higher ranks of society.

    1. Photo of Niamh Muldoon

      Niamh Muldoon

      senior director of trust and security at OneLogin

  6. Authenticate and Survive – Why Current Options Are Better than Ever

    As employees gain more access to important information, the need for greater security increases.

    1. Photo of Brian Wallace

      Brian Wallace

      Founder and President of NowSourcing

  7. Stop Punching in the Dark

    The blind spot of visibility is not only going unaddressed, it’s getting bigger and bigger

    1. Photo of Lindsay Whyte

      Lindsay Whyte

      Regional Director, Constella Intelligence

  8. Cyber Resilience During Times of Uncertainty

    A cyber resilience approach is based on the premise of organizing defenses to prioritize resiliency over security to keep your business going

    1. Photo of Tom Patterson

      Tom Patterson

      Chief Trust Officer, Unisys

  9. #HowTo Master Cybersecurity Training with a Third Party

    Without specialist in-house teams, staying on top of cybersecurity matters is a challenge for SMBs

    1. Photo of Jay Ryerse

      Jay Ryerse

      CISSP, VP of Cybersecurity Initiatives at ConnectWise

  10. What Can We Learn About Cybersecurity From the 2020 Elections?

    Lessons learned from this election, and for what can be utilized in the future

    1. Photo of Yotam Gutman

      Yotam Gutman

      Marketing Director at SentinelOne, SentinelOne

  11. Why Don’t You Have a Certificate Manager?

    Certificate management is important and few enterprises have the necessary talent and expertise to do the job

    1. Photo of Dean Coclin

      Dean Coclin

      Senior Director of Business Development, DigiCert

  12. Countering Threat Data Overload: The Importance of Curation

    Why data curation is the future of threat intelligence

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  13. Proactively and Securely Reducing Your Organization’s Data Footprint

    Active data erasure is one aspect that is essential.

    1. Photo of Frederik Forslund

      Frederik Forslund

      Vice President, Enterprise & Cloud Erasure Solution, Blancco Technology Group

  14. The Need for Continuous Authentication

    Implementation of continuous authentication schemes should be transparent to employees

    1. Photo of Sid Potbhare

      Sid Potbhare

      CEO at Untethered Labs

  15. Why Cybersecurity isn’t What You Think it is

    Are we all becoming cybersecurity snobs?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  16. The Convergence of Ransomware and Public Relations

    Have a plan in place that outlines how you will handle a ransomware incident

    1. Photo of Meredith Griffanti

      Meredith Griffanti

      Managing Director, Washington, DC, FTI Consulting

    2. Photo of Evan Roberts

      Evan Roberts

      Senior Director, New York, FTI Consulting

  17. Defend Yourself Against Dark Data

    How can you protect your company against dark data?

    1. Photo of Amar Kanagaraj

      Amar Kanagaraj

      Founder & CEO, oneDPO

  18. Close the Online Trust Gap With Identity Proofing

    The goal is to balance a better customer experience with a strong company position.

    1. Photo of Ryan Alexander

      Ryan Alexander

      VP of Fraud Product Management at Prove

  19. BYOD and Enterprise Apps: Balancing Security and Employee Privacy

    IT needs to protect data without compromising employee privacy.

    1. Photo of Tom Tovar

      Tom Tovar

      CEO and co-creator of Appdome

  20. Why I’m Not Sold on Autonomous Security

    Can ML-powered IDS become a fully autonomous network defense?

    1. Photo of Dr. David Brumley

      Dr. David Brumley

      CEO and co-founder, ForAllSecure

What’s Hot on Infosecurity Magazine?