Infosecurity Opinions

  1. Landmark International Data Transfer Case Boosts EU Data Privacy Laws

    How a recent political precedent affects future data protection laws

    1. Photo of Simon Taylor

      Simon Taylor

      Partner, Forensic Risk Alliance

  2. Remote Work Highlights the Need For a People-Centric Approach to Cybersecurity

    Humans are harder to protect than machines — but just as important

    1. Photo of Tim Sadler

      Tim Sadler

      CEO, Tessian

  3. The Art of (Phone) War: How Consumers Can Fight Back When Phone Companies Sell Their Personal Data

    How and why phone companies are selling consumer data along with tools and resources to fight back and protect customer privacy.

    1. Photo of Paul Perry

      Paul Perry

      Freelance writer, Fairshake

  4. Getting Ahead of Cybersecurity Disasters

    Steps to help you keep your data safe

    1. Photo of Francois Rodriguez

      Francois Rodriguez

      Chief Growth Officer, Adeya

  5. #HowTo Secure the Supply Chain

    Five best practices for third-party vendor risk and securing the supply chain

    1. Photo of Stu Sjouwerman

      Stu Sjouwerman

      Founder and CEO, KnowBe4

  6. Using an Adversary to Calibrate Your Program

    It’s time CISOs leverage the relative sophistication of threat actors and use it to base their security story

    1. Photo of Douglas Ferguson

      Douglas Ferguson

      Founder and CTO, Pharos Security

  7. Patching Vulnerabilities in IoT Devices is a Losing Game

    Why has IoT cybersecurity traditionally relied on vulnerability patching>

    1. Photo of Natali Tshuva

      Natali Tshuva

      CEO and Co-Founder, Sternum

  8. Trust But Verify - Mitigating Privilege Account Risks

    By understanding how privilege access occurs, organizations can more easily identify a network compromise and act before a catastrophic breach

    1. Photo of Chris Morales

      Chris Morales

      head of security analytics at Vectra

  9. Biometrics: The Future of Payment Authentication

    Biometric payment cards are currently in trial across some banks in Europe

    1. Photo of David Smith

      David Smith

      Independent Consultant

  10. Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?

    Industry-wide initiative is a necessity to ensure hospitality corporates stand the best chance to succeed

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  11. Why Do Kubernetes and Containers Go Hand in Hand with Machine Learning?

    Containers allow data to work on their Machine Learning and Artificial Intelligence programs and improve them significantly

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  12. Virtual Cybersecurity Professionals Needed During Times of Uncertainty

    Virtual Cybersecurity Professionals are the latest trend in cybersecurity hiring

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  13. Too Many Vulnerabilities, Too Little Time

    Why risk-based vulnerability management needs to be predictive

    1. Photo of Simon Roe

      Simon Roe

      Application Security Product Manager, Outpost24

  14. Moving to the Work From Home SOC

    Troubleshooting is harder when remote

    1. Photo of Chris Triolo

      Chris Triolo

      VP of customer success at Respond Software

  15. How Cloud-Based Training Can Better Enable Remote Workers

    The cloud, after all, is designed to suit the needs of a distributed workforce

    1. Photo of Zvi Guterman

      Zvi Guterman

      Founder and CEO, CloudShare

  16. How You Can Avoid an IoT Doomsday

    The slightest misconfiguration or poor security practices can serve as a point of entry for sophisticated cyber-attacks

    1. Photo of Ken Galvin

      Ken Galvin

      Senior Product Manager for KACE System Management Appliance

  17. #HowTo Cut Costs in the SOC

    Ways where you can reduce costs but not efficiency in your SOC

    1. Photo of Mark Orlando

      Mark Orlando

      Co-founder, Bionic Cyber

    2. Photo of Ryan Shaw

      Ryan Shaw

      Co-founder, Bionic Cyber

  18. Data Security is Everyone’s Problem

    Data security must be management-led, and followed by everyone.

    1. Photo of Alan Bentley

      Alan Bentley

      President of Global Strategy, Blancco

  19. GDPR Two Years On – Has it Gone How we Hoped?

    Two years on, did the introduction of the GDPR go as planned?

    1. Photo of James Chappell

      James Chappell

      Co-Founder & Chief Innovation Officer, Digital Shadows

  20. Why the Industry Needs to Step Up Action on Malicious Domains

    Why steps need to be taken to stamp out malicious domains more than ever

    1. Photo of Patrick Martin

      Patrick Martin

      Head of threat intelligence, Skurio

What’s Hot on Infosecurity Magazine?