Infosecurity Opinions

  1. CISOs: Here are the Cybersecurity Concerns Boards Really Care About

    As companies tighten budgets going into 2021, it’s important to communicate security ROI in an understandable language

    1. Photo of Colin O’Connor

      Colin O’Connor

      Chief Operating Officer of ReliaQuest

  2. Account Takeover Risks of Small Businesses: How to Avoid Them

    How to detect, and recover, from account takeover attacks

    1. Photo of Ben Hartwig

      Ben Hartwig

      Web operations director at InfoTracer

  3. Is Encryption the Answer to Data Security Post Lockdown? #NCSAM

    If businesses want to secure data on the move, it is essential that encryption and endpoint control is applied to all devices

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  4. Preventing Business Email Compromise Calls for Analyzing Email Language

    Most email security tools are designed to look for the what and the who

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  5. Ripple20 Isn’t An Anomaly – IoT Security Is A Mess (Still) #NCSAM

    Ripple20 isn’t the only IoT security fiasco, it’s just the latest

    1. Photo of Jeff Costlow

      Jeff Costlow

      CISO, Extrahop

  6. Mythbusters: Three Misconceptions About Zero Trust

    What’s the key to achieving perfect Zero Trust?

    1. Photo of Michael Covington

      Michael Covington

      VP of Product Strategy, Jamf

  7. Cybersecurity Lessons Learned from Data Breaches and Brand Trust Matters

    Public confidence in your digital security – is make-or-break for your business, not just part of your compliance checklist.

    1. Photo of Bindu Sundaresan

      Bindu Sundaresan

      Director, AT&T Cybersecurity

  8. Old Tools, New Tricks: How AI Can Extend Existing Security Investments to Meet New Challenges

    Utilizing AI and machine learning technology really can be a game-changer for identity

    1. Photo of Tim Bedard

      Tim Bedard

      senior director, product marketing at ForgeRock

  9. How do Organizations Choose a Cloud Service Provider? Is it Like an Arranged Marriage?

    Have you ever had to make a critical decision rationalised by clear value drivers but heavily reliant on trust?

    1. Photo of Dalia Kader

      Dalia Kader

      Information Security Manager

    2. Photo of Husna Siddiqi

      Husna Siddiqi

      Information Protection Audit Management Lead

  10. The Digital Transformation Reckoning Caused By COVID-19

    How companies survived a rapid and forced digital transformation.

    1. Photo of Joe Vadakkan

      Joe Vadakkan

      Cloud Security Leader at Optiv Security

  11. Why Cybersecurity Alliances Are a 21st Century Necessity

    Building cyber defenses beyond an organization are just as important as securing its own internal infrastructure.

    1. Photo of Khalid Al Harbi

      Khalid Al Harbi

      chief information security officer, Aramco

  12. #HowTo Launch a Remote SOC

    Having SOC analysts work remotely during lockdown shows ‘going virtual’ is possible

    1. Photo of Spencer Lichtenstein

      Spencer Lichtenstein

      Product Strategist, RSA Security

  13. CEOs Will be Responsible for IoT Security – Where Do They Start? #NCSAM

    The auditing of IIoT needs to be done digitally using technology like distributed ledgers

    1. Photo of Ian Ferguson

      Ian Ferguson

      VP Marketing and Strategic Alliances at Lynx Software Technologies

  14. Onslaught of Login (Brute Force) Attacks Shakes Enterprise IT Security

    Brute force is an old method of attack but is still effective

    1. Photo of Rakesh Soni

      Rakesh Soni

      CEO & Co-Founder of LoginRadius

  15. Twitter Hack Spurred Copycats, But Other Businesses Don’t Have to Fall Prey

    The consequences of privileged identity exposure are potentially catastrophic, as the Twitter hack demonstrated.

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  16. How Hybrid Learning is Changing K-12 Cybersecurity

    It’s up to everyone to keep cybersecurity, student safety, and data privacy top-of-mind through this shift.

    1. Photo of Charlie Sander

      Charlie Sander

      CEO, ManagedMethods

  17. Securing Remote Desktops During a Pandemic

    Remote work is needed to ensure everyone has the flexibility they need to be productive under unpredictable circumstances.

    1. Photo of Mike Jumper

      Mike Jumper

      CEO of Glyptodon, PMC Chair of Apache Guacamole

  18. Renew Your Vulnerability Management Program

    Organizations should invest in vulnerability scanning solutions to gain visibility into all assets and vulnerabilities.

    1. Photo of John Ayers

      John Ayers

      Chief Strategy Product Officer, Nuspire

  19. Maintaining Remote Workforce Productivity Without Peaking Privacy Concerns

    COVID-19 has generated a new surge in popularity for surveillance technologies

    1. Photo of David McGeough

      David McGeough

      Director of International Marketing at Wrike

  20. Compromised Devices Await Office Return to Strike

    Remote working has also put an increased focus on identity access management, credential theft, and privilege escalation

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

What’s Hot on Infosecurity Magazine?