Infosecurity Opinions

  1. What's Next After the Big 'Zero Trust' Welcome Back to the Office?

    Organizations must prepare for a future where CFOs cash-in on the financial savings and productivity gains of a permanent work-from-home culture

    1. Photo of Morgan Wright

      Morgan Wright

      Chief Security Adviser, SentinelOne

  2. Is Critical Infrastructure Ready for Quantum?

    Collectively, we want to realize all of the benefits of quantum without compromising security.

    1. Photo of Scott Totzke

      Scott Totzke

      Chief Executive Officer and Co-Founder of ISARA Corporation

  3. Misconfiguration on the Cloud is as Common as it is Costly

    Remote work has opened profitable new horizons in cybercrime

    1. Photo of Brendan O’Connor

      Brendan O’Connor

      CEO and Co-founder of AppOmni

  4. Getting Your ‘Return’ to Work Strategy, Right

    A robust data management strategy will affect our return to work, it will actually improve our working lives

    1. Photo of Greg Hanson

      Greg Hanson

      VP EMEA and LATAM at Informatica.

  5. Is Your Cloud Backup Ready to Handle a Crisis?

    Keeping down cost and complexity in disaster recovery and business continuity

    1. Photo of Drew Markham

      Drew Markham

      Service strategist, Fordway

  6. Securing Remote Operations with Digital Identity Management

    Why identity management, on premise and as a service, is crucial to maintain remote worker security

    1. Photo of Simon Wood

      Simon Wood

      CEO, Ubisecure

  7. Evolution to Becoming a Modern Day CISO

    A CISO has to act as an educator, coaching and empowering both technology teams to understand the business goals

    1. Photo of Jason  Hicks

      Jason Hicks

      Global CISO at Kudelski Security

  8. Forget Protection: Is Your SOC Ready to Defend?

    Rebuilding the SOC means rethinking the roles of people who work in them

    1. Photo of Chris Calvert

      Chris Calvert

      Co-Founder, Respond Software

  9. Cloud’s Silver Lining: Patching the Fluid Workforce

    A new challenge is to maintain network changes in the long-term as many were implemented quickly and as a temporary solution

    1. Photo of Chris Goettl

      Chris Goettl

      Product Manager, Ivanti

  10. Kleptopredation in a Digital World

    How malicious cyber actors increasingly leverage a hunting strategy borrowed from the world of marine biology, called Kleptopredation

    1. Photo of Daniel Woods

      Daniel Woods

      Manager, Alvarez and Marsal

  11. The Future of Work and Protecting Your Cloud-Based Office from Cyber-Attacks

    Not all businesses have the proper tech infrastructure in place to equip, support and manage productive remote working

    1. Photo of Nick Turner

      Nick Turner

      VP EMEA, Druva

  12. #HowTo Build a Telegram Security Plan

    Five ways to protect yourself with a telegram security plan

    1. Photo of Segun Onibalusi

      Segun Onibalusi

      Digital Marketing Consultant

  13. Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks

    There is no foolproof method to ensuring you do not experience sinister cyber activity

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  14. The Anatomy of a SaaS Attack: Catching and Investigating Threats with AI

    Little attention is given to how the TTPs in SaaS attacks differ significantly from traditional TTPs seen in networks and endpoint attacks

    1. Photo of Max Heinemeyer

      Max Heinemeyer

      Director of Threat Hunting, Darktrace

  15. The Gig Economy: A New Battleground for Cybersecurity

    The average UK workplace now comprises of a mix of full-time, part-time and short-term workers.

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  16. DFIR, Threat Hunting, and Navigating COVID-19 Lockdowns

    When it comes to advanced DFIR and threat hunting, being remote has proven cumbersome at best and highly restrictive at worst.

    1. Photo of Vikram Chabra

      Vikram Chabra

      Head of the cybersecurity practice at Netenrich

  17. Why Microservices Require Unified Tools for Authorization

    How do businesses handle microservice authorization controls?

    1. Photo of Tim Hinrichs

      Tim Hinrichs

      Co-creator of Open Policy Agent and CTO at Styra

  18. Don’t Compromise: Securing Your Company’s Data Amid Remote Working and Lay-offs

    How will healthcare companies' security recover after the pandemic?

    1. Photo of Caleb Barlow

      Caleb Barlow

      CEO, CynergisTek

  19. Fixing the Biggest IoT Issue — Data Security

    Without the introduction of the AIoT, the growth of applications across all areas of our lives would be significantly diminished

    1. Photo of Mark Lippett

      Mark Lippett

      CEO, XMOS

  20. Grassroots Data Security: Leveraging User Knowledge to Set Policy

    Deep learning gives us two tools to do it: representation learning and anomaly detection.

    1. Photo of Karthik Krishnan

      Karthik Krishnan

      CEO, Concentric

What’s Hot on Infosecurity Magazine?