Infosecurity Opinions

  1. #HowTo Not Make Backups: Do You Really Want to Protect Your Data?

    Although backups are a critical element of incident response, they can be used against companies unless set up properly.

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  2. Improving Email Security is About Disguising a Secure Solution as Email, Not Trying to Fix its Protocols

    Typical email protocols lack a lot of features that are essential from a security and privacy perspective

    1. Photo of Rick Goud

      Rick Goud

      CEO and Co-Founder, Zivver

  3. VPN Split-Tunneling – To Enable or Not To Enable

    How VPN split-tunneling can create additional risks and benefits to entities utilizing VPNs.

    1. Photo of Eric Jeffery

      Eric Jeffery

      Sr. Managing Consultant and Solutions Architect, IBM Security

  4. Cybercrime Has Undergone an Industrial Revolution – How to Keep Up

    Knowing how cyber-criminals use the services can provide an understanding of the threats they’re up against.

    1. Photo of Liv Rowley

      Liv Rowley

      Threat Analyst, Blueliv

  5. Who Owns Responsibility for Industrial Cybersecurity?

    Securing CNI is often considered to be a joint responsibility between the private and public sectors.

    1. Photo of Galina Antova

      Galina Antova

      Chief business development officer and co-founder of Claroty.

  6. The New Normal: Working from Home and Extending Perimeter Defenses

    Remote work has grown by 400 percent in the last ten years and enterprises should be aiming for Secure Access anytime, anywhere, from any device.

    1. Photo of Bryan Embrey

      Bryan Embrey

      Sr. Product Marketing Manager, Pulse Secure

  7. Launching a Vendor Risk Management Program with Limited Resources

    With third-party data breaches affecting all organizations, a VRM program is necessary to help safeguard organizations from an attack.

    1. Photo of David Klein

      David Klein

      Senior Director, Product Strategy, ProcessUnity, ProcessUnity

  8. Landmark International Data Transfer Case Boosts EU Data Privacy Laws

    How a recent political precedent affects future data protection laws

    1. Photo of Simon Taylor

      Simon Taylor

      Partner, Forensic Risk Alliance

  9. Remote Work Highlights the Need For a People-Centric Approach to Cybersecurity

    Humans are harder to protect than machines — but just as important

    1. Photo of Tim Sadler

      Tim Sadler

      CEO, Tessian

  10. The Art of (Phone) War: How Consumers Can Fight Back When Phone Companies Sell Their Personal Data

    How and why phone companies are selling consumer data along with tools and resources to fight back and protect customer privacy.

    1. Photo of Paul Perry

      Paul Perry

      Freelance writer, Fairshake

  11. Getting Ahead of Cybersecurity Disasters

    Steps to help you keep your data safe

    1. Photo of Francois Rodriguez

      Francois Rodriguez

      Chief Growth Officer, Adeya

  12. #HowTo Secure the Supply Chain

    Five best practices for third-party vendor risk and securing the supply chain

    1. Photo of Stu Sjouwerman

      Stu Sjouwerman

      Founder and CEO, KnowBe4

  13. Using an Adversary to Calibrate Your Program

    It’s time CISOs leverage the relative sophistication of threat actors and use it to base their security story

    1. Photo of Douglas Ferguson

      Douglas Ferguson

      Founder and CTO, Pharos Security

  14. Patching Vulnerabilities in IoT Devices is a Losing Game

    Why has IoT cybersecurity traditionally relied on vulnerability patching>

    1. Photo of Natali Tshuva

      Natali Tshuva

      CEO and Co-Founder, Sternum

  15. Trust But Verify - Mitigating Privilege Account Risks

    By understanding how privilege access occurs, organizations can more easily identify a network compromise and act before a catastrophic breach

    1. Photo of Chris Morales

      Chris Morales

      head of security analytics at Vectra

  16. Biometrics: The Future of Payment Authentication

    Biometric payment cards are currently in trial across some banks in Europe

    1. Photo of David Smith

      David Smith

      Independent Consultant

  17. Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?

    Industry-wide initiative is a necessity to ensure hospitality corporates stand the best chance to succeed

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  18. Why Do Kubernetes and Containers Go Hand in Hand with Machine Learning?

    Containers allow data to work on their Machine Learning and Artificial Intelligence programs and improve them significantly

    1. Photo of Rebecca James

      Rebecca James

      Cybersecurity journalist

  19. Virtual Cybersecurity Professionals Needed During Times of Uncertainty

    Virtual Cybersecurity Professionals are the latest trend in cybersecurity hiring

    1. Photo of Scott Schlimmer

      Scott Schlimmer

      chief operating officer and co-founder, ZenPrivata

  20. Too Many Vulnerabilities, Too Little Time

    Why risk-based vulnerability management needs to be predictive

    1. Photo of Simon Roe

      Simon Roe

      Application Security Product Manager, Outpost24

What’s Hot on Infosecurity Magazine?