Infosecurity Opinions

  1. Keeping Your Backups Safe from Ransomware Attacks

    If you don’t practice data backup hygiene, files could end up encrypted during the ransomware attack.

    1. Photo of Victor Congionti

      Victor Congionti

      CEO, Proven Data

  2. Making Security a Team Sport is Critical to Identity Access Management Success

    A framework to make IAM collaborative, determining stakeholders and making security everyone’s job.

    1. Photo of Adam Bosnian

      Adam Bosnian

      Executive vice president of global business development, CyberArk

  3. Why You Should Stop Measuring Cybersecurity in Terms of Budget

    There is a disconnect between how companies measure their cybersecurity readiness and achieving effective security in reality.

    1. Photo of Max  Vetter

      Max Vetter

      Chief Cyber Officer, Immersive Labs

  4. People, We Need to Talk About Mass Electronic Surveillance

    The ethics of nationwide electronic surveillance databases related to #COVID19

    1. Photo of Martin Wilcox

      Martin Wilcox

      VP Technology EMEA at Teradata

  5. How Useful Is MITRE's '25 Most Dangerous Software Errors' List?

    As it is based on real-world data rather than anecdotal reports, the CWE Top 25 becomes a measure of what matters most.

    1. Photo of Oleg Kolesnikov

      Oleg Kolesnikov

      VP of Threat Research/Cybersecurity, Securonix

  6. Winning the War on Fraud During COVID-19

    Securing this new geographically dispersed workforce and protecting every employee from fraud is the next major concern

    1. Photo of Brett Beranek

      Brett Beranek

      VP & General Manager, Security and Biometrics, Nuance

  7. Retaining Encryption Keys

    Organizations need to both be able to secure their cryptographic keys away from the encrypted data and be able to manage and view them

    1. Photo of Faiyaz Shahpurwala

      Faiyaz Shahpurwala

      Chief Product & Strategy Officer at Fortanix

  8. Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security

    With so many “things” coming online, businesses must act to ensure IoT breach detection and mitigation capabilities are as effective

    1. Photo of Dmitry Raidman

      Dmitry Raidman

      CEO, CTO, and Co-Founder, Cybeats

  9. Behind the Scenes of Dark Net Market Closures and Their Consequences

    What happens behind the scenes of Dark Net market closures and how these sites are being replaced by smaller, specialized stores.

    1. Photo of David Carmiel

      David Carmiel

      CTO, KELA

  10. Networking in the Time of COVID-19

    Innovations have shifted enterprise technology out of on-premise hardware and onto cloud-based platforms

    1. Photo of Jesper Andersen

      Jesper Andersen

      President and CEO, Infoblox

  11. The Role of Containerization to Protect Enterprise Cloud Ecosystems

    The security posture of unmanaged endpoints is below that of the organization’s managed devices

    1. Photo of Dave Waterson

      Dave Waterson

      CEO and Chairman of the Board at SentryBay Ltd

  12. Remote Working: How To Protect Your Employees’ Mental Health

    Coping with everything that’s happening and the shift to working in isolation is proving rather difficult for many workers.

    1. Photo of Orion Talmay

      Orion Talmay

      Wellness Expert

  13. We Don’t Need More Cybersecurity, We Need Better Cybersecurity

    Why are data breaches becoming more frequent and more costly?

    1. Photo of Jason Revill

      Jason Revill

      Director of UK and Ireland Security Consulting, Avanade

  14. Why You Want to Fail a Red Team Exercise

    Why failing a Red Team exercise is good and what happens afterwards is more important.

    1. Photo of Gemma Moore

      Gemma Moore

      Director, Cyberis

  15. The Do’s and Don’ts of Building a Cybersecurity Program

    Pointers on the do’s and don’ts of building an effective security program.

    1. Photo of Nick Frost

      Nick Frost

      Director of Cyber Risk Management Group (CRMG)

  16. Bad UX Design Always Leads to Compromised Security

    When you make things with the user in mind, you create experiences that are free of frustrations

    1. Photo of Jacqueline Carter

      Jacqueline Carter

      Software engineer and a tech writer

  17. #HowTo Spot Lesser-Known Phishing Tricks that Employ Social Engineering

    Social engineering is also a matter of thinking out of the box

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  18. Business as (un)usual: Communicating During a Pandemic, and Beyond

    A global pandemic creates fear, confusion and disruption – all of which attackers will capitalize upon

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  19. How the MSSPs Can Strive to be Detection Ninjas

    An MSSP engineers for both situational awareness and situational consistency.

    1. Photo of Pukhraj Singh

      Pukhraj Singh

      Product Owner, Cyber Threat Detection, SilverSky by BAE Systems

  20. The Bigger Perimeter Picture of #COVID19

    Temporary fixes ignore more fundamental strategic need to move towards a zero trust and identity centric security model

    1. Photo of Phil Allen

      Phil Allen

      VP EMEA, Ping Identity

What’s Hot on Infosecurity Magazine?