Infosecurity Opinions

  1. Building a Blueprint for a Successful Micro-segmentation Implementation

    How organizations can implement and manage SDN-enabled micro-segmentation strategies

    1. Photo of Avishai Wool

      Avishai Wool

      CTO, AlgoSec

  2. How Prepared is Your Business to Face Botnet Threats

    To be on the safe side, you need to understand the implications of these attacks and know the precautions to take

    1. Photo of Adedeji  Adewale

      Adedeji Adewale

      Founder of Digita-index

  3. #HowTo Choose a Link Analysis Tool

    These tools visualize data and draw relationships between otherwise disparate pieces of information

    1. Photo of Peter Prizio

      Peter Prizio

      Vice President of Product Management at King & Union

  4. Securing Smart Cities of the Future

    Managing the cyber-risks of smart cities is crucial in realizing their potential

    1. Photo of Vishal Salvi

      Vishal Salvi

      CISO and Head of Cybersecurity Practice, Infosys

  5. How Traditional Machine Learning Is Holding Cybersecurity Back

    Traditional machine learning-based cybersecurity solutions fail to keep up with the growing sophistication of today’s cyber threats

    1. Photo of Stephen Salinas

      Stephen Salinas

      Head of Product Marketing, Deep Instinct, Deep Instinct

  6. The Safety Mandates Every Enterprise Needs – Even with a Secured Cloud Offering

    How to take ownership of your data’s security as part of your cloud strategy

    1. Photo of Dinesh Rao

      Dinesh Rao

      EVP and Global Head of Enterprise Application Services, Infosys

  7. Why Bots Should Keep You Up at Night, and How to Get Some Sleep Back

    As the internet expands, and bots become more essential to maintaining it

    1. Photo of Richard Meeus

      Richard Meeus

      Director of Security Technology and Strategy EMEA, Akamai

  8. Creating a Modern Office that Appeals to Techy Staff

    Creating a great work environment is essential.

  9. Using Machine Learning to Transform Data into Cyber Threat Intelligence

    Combination of threat analysis and data analysis with machine learning can help security teams turn raw data into cyber threat intelligence.

    1. Photo of Tawnya Lancaster

      Tawnya Lancaster

      Lead Product Manager, Alien Labs, AT&T Cybersecurity

  10. Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach

    Steps IT teams can take to achieve better cybersecurity for your remote workers.

    1. Photo of Jason Dettbarn

      Jason Dettbarn

      Founder and CEO of Addigy

  11. Securing Active Directory

    Every computer on the company’s network must have some level of access to AD for the network environment to function correctly.

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  12. Losing the Human Touch to Protect Data

    Why it is important to remove users from the equation if we want to protect data and deliver inherent security

    1. Photo of Nigel Thorpe

      Nigel Thorpe

      Technical Director, SecureAge

  13. Delving Into the Weaponization of AI

    To the surprise of almost no-one, AI is being weaponized by cyber adversaries.

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  14. No Time for Email Protection Roulette

    Extra caution should be exercised when safeguarding not just what’s coming in, but also what’s going out, via email.

    1. Photo of Jamie Manuel

      Jamie Manuel

      VP Product Management, Titus

  15. Dealing with Legacy Open Source—Issues and Solutions

    An alarming number of organizations consuming open source are not applying the patches they need

    1. Photo of Fred Bals

      Fred Bals

      researcher, Synopsys Cybersecurity Research Centre (CyRC)

  16. Good Bot, Bad Bot: To Block or Not to Block. That is the Question—and the Answer

    The number of “bad bots” continues to grow.

    1. Photo of Andrew Useckas

      Andrew Useckas

      CTO at ThreatX

  17. #HowTo Make Security Expertise Accessible to Developers

    How security champion programs can make security expertise accessible to developers

    1. Photo of Dan Cornell

      Dan Cornell

      CTO and Principal, Denim Group

  18. Checkmate: Cybersecurity Strategy on the Modern Battlefield

    It is World Chess Day! What can modern cybersecurity learn from the game of chess?

    1. Photo of Rich  Turner

      Rich Turner

      Senior Vice-President EMEA, CyberArk

  19. How Managed Services Can Help Simplify Cybersecurity in a post-COVID-19 World

    Many IT teams are overburdened with too many disparate tools and not enough time and expertise to leverage them.

    1. Photo of Aaron Branson

      Aaron Branson

      Vice president of Marketing at Netsurion

  20. Cybersecurity Recuperation: Ensuring a Safe Return to Work

    Cybersecurity teams must act to ensure the necessary processes and tools are in place before employees head back to their workplace.

    1. Photo of Geert van der Linden

      Geert van der Linden

      Executive Vice President of Cybersecurity, Capgemini

What’s Hot on Infosecurity Magazine?