Infosecurity Opinions

  1. #HowTo Adopt an Identity-Centric Security Approach

    A forward-thinking company uses an identity-centric security approach to reduce the risk of a breach or failed audit

    1. Photo of Stephen Lee

      Stephen Lee

      Vice President, Technical Strategy & Partnerships, Okta

  2. The Secure SD-WANderful Approach to Securing Your Workers at Home and in the Office

    Secure SD-WAN provides the scalability, performance, and security necessary to make sure this flexibility is a reality.

    1. Photo of Michael Wood

      Michael Wood

      CMO, Versa Networks

  3. Redefine the Risk Dynamic Within Your Business to Enhance Innovation And Development

    Redefine how your business sees risk, and create a predictable model for investing in risk-reduction that accelerates speed-to-market

    1. Russell Coleman

      EMEA Sales Manager, HackerOne

  4. Key Management with Acuity: On-Premises, Cloud, Hybrid

    Sophisticated key management solutions are essential to any cryptographic operation

    1. Photo of Adam Cason

      Adam Cason

      vice president, global and strategic alliances, Futurex

  5. How to Organize Employees to Cooperate in Threat Mitigation

    Cooperation is important for mitigating cybersecurity threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  6. Why Storytelling Should be at the Heart of Security Training

    The answer to engaging awareness content lies in storytelling

    1. Photo of Simeon Quarrie

      Simeon Quarrie

      founder and CEO of VIVIDA

  7. It’s Time to Fight Back and Protect our Critical Infrastructure

    We are still in the throes of a pandemic, but it should be an imperative to get your data back under control.

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  8. IoT Security: Everything Starts with Awareness #NCSAM

    Is one month enough time to plant the right cybersecurity seeds and make an impact within the IoT community?

    1. Photo of Don Schleede

      Don Schleede

      Information Security Officer at Digi International

  9. The Threat From Within – A Genuine Horror Story

    Which steps you can take to ensure security doesn't give you a fright this Halloween

    1. Photo of Rashid Ali

      Rashid Ali

      Enterprise Sales Manager, UKI & Nordics, Wallix

  10. Security Threats Facing Universities

    Universities weakened by COVID impact can be easy prey for cyber-attack; it’s time to fight back

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

  11. The Case for a Federated Responsibility Model for Application Security to Power Secure DevOps

    Centralized control model no longer applies to today’s software-defined world

    1. Joanne Godfrey

      Security Evangelist, ZeroNorth

  12. Information Security in Agile Development

    Changes to be made to support the transformation of software development within an Agile framework.

    1. Photo of Gerald  Pang

      Gerald Pang

      Information Risk Manager

  13. Why Does The Software Defined Perimeter (SDP) Matter?

    Organizations using hosting options should use a VPN and SDP to ensure security and a positive user experience

    1. Photo of Achi Lewis

      Achi Lewis

      EMEA Director for NetMotion

  14. #HowTo Enhance Borderless Networks with Cloud-Managed DDI #NCSAM

    Flexible organizations require a flexible solution

    1. Photo of Malcolm Murphy

      Malcolm Murphy

      Dr Malcolm Murphy, systems engineering manager, Infoblox,

  15. Why Your CSPM Might Be Falling Short

    Why the traditional CSPM model falls short within cloud-native organizations

    1. Photo of Idan Tendler

      Idan Tendler

      Co-founder and CEO, Bridgecrew

  16. CISOs: Here are the Cybersecurity Concerns Boards Really Care About

    As companies tighten budgets going into 2021, it’s important to communicate security ROI in an understandable language

    1. Photo of Colin O’Connor

      Colin O’Connor

      Chief Operating Officer of ReliaQuest

  17. Account Takeover Risks of Small Businesses: How to Avoid Them

    How to detect, and recover, from account takeover attacks

    1. Photo of Ben Hartwig

      Ben Hartwig

      Web operations director at InfoTracer

  18. Is Encryption the Answer to Data Security Post Lockdown? #NCSAM

    If businesses want to secure data on the move, it is essential that encryption and endpoint control is applied to all devices

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  19. Preventing Business Email Compromise Calls for Analyzing Email Language

    Most email security tools are designed to look for the what and the who

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  20. Ripple20 Isn’t An Anomaly – IoT Security Is A Mess (Still) #NCSAM

    Ripple20 isn’t the only IoT security fiasco, it’s just the latest

    1. Photo of Jeff Costlow

      Jeff Costlow

      CISO, Extrahop

What’s Hot on Infosecurity Magazine?