Infosecurity Opinions

  1. With Third-Party Providers, Trust is in Short Supply

    Innovation, therefore, increasingly necessitates outsourcing.

    1. Photo of Rodney Joffe

      Rodney Joffe

      Senior Vice President and Fellow, Neustar

  2. The Five States of Compliance Maturity: Building a Strong Training Strategy

    A comprehensive training strategy can result in major, long-term dividends.

    1. Photo of Andy Nickolls

      Andy Nickolls

      Senior Director of Compliance EMEA at Skillsoft

  3. #HowTo Deal with Apple Ransomware

    In contrast to a widespread misconception, Mac computers are susceptible to ransomware and other types of predatory code

    1. Photo of David Balaban

      David Balaban

      Computer security researcher

  4. Code Signing: How to Respond to the Hidden Threat

    How do you know the code you’re using can be trusted?

    1. Photo of Eddie Glenn

      Eddie Glenn

      Senior Product Manager, Venafi

  5. Weaponized Data Breaches: Fueling a Global Cyber Cold War

    Escalating geo-political tensions are intensifying the global cyber cold war with no end in sight

    1. Photo of Monica Pal

      Monica Pal

      CEO, 4iQ

  6. New Year, New Operating System

    The truth is migrating to a new operating system can be a pain

    1. Photo of Andy Baldin

      Andy Baldin

      VP EMEA, Ivanti

  7. Options to End the End to End Encryption Debate

    The debate has been framed as being between privacy and security

    1. Photo of Dawn Alford

      Dawn Alford

      Journalist and Broadcaster

  8. How eLearning Can Increase Company Cybersecurity Across the Board

    Its better to be proactive rather than reactive

  9. The Risk of Increase in Social Cyber Security in 2020

    One way social proof can drive positive cybersecurity behaviors is by highlighting the right that others are doing.

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  10. DevOps and Security – What’s in a Name?

    By looking at a DevOps Security approach rather than DevSecOps, security teams can use their influence and experience to their advantage

    1. Photo of Marco Rottigni

      Marco Rottigni

      Chief Technical Security Officer EMEA, Qualys

  11. Preparing Your Enterprise For a Post-Quantum Future

    There is no easy way to know if you are behind the curve, on schedule, or moving too slowly

    1. Photo of Mark B Cooper

      Mark B Cooper

      President and Founder, PKI Solutions & ISACA Author

  12. Knowing Your Enemy: Attack Attribution in Cybersecurity

    While you can’t predict all attacks, you can use intelligence from the past to mitigate

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  13. Do We Need More Cyber Hygiene?

    Judging from the continued news of breaches, do we ever have enough cyber hygiene?

    1. Photo of Arun Vishwanath

      Arun Vishwanath

      Researcher, Author, Technologist

  14. #HowTo Do SD-WAN Security

    Arguably SD-WAN’s greatest benefit is identifying and closing holes in an enterprise’s security.

    1. Photo of Patrick Hubbard

      Patrick Hubbard

      Head Geek, SolarWinds

  15. Life as a Crowdsourced Hacker – Why You Won’t Become a Millionaire

    It’s important to understand what you’re in for

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  16. Is This the Beginning of the End for Transport Layer Security Inspection Techniques?

    The NSA makes it clear that TLSI does have advantages

    1. Photo of Omar Yaacoubi

      Omar Yaacoubi

      CEO, Barac

  17. Data Leaks, Not Hacks, Are the Fastest Way to Sink a Brand

    Brands are unaware of who fourth parties are, and damage control becomes more challenging

    1. Photo of Chemi Katz

      Chemi Katz

      CEO and co-founder Namogoo

  18. Is TikTok a Cybersecurity Threat?

    There are concerns about TikTok, so what can we do about them?

  19. Hidden Cyber Risks: Mitigating Malware in Your Hotel Curtains

    Attackers are increasingly looking to target people while they are travelling

    1. Photo of Laurie Graham

      Laurie Graham

      Director Cyber Intelligence at 6point6

  20. Why Businesses Need to Re-Think Network Monitoring in 2020

    The current approach to network security is significantly flawed on two counts

    1. Photo of Ivan Blesa

      Ivan Blesa

      Head of Product, Noble

What’s Hot on Infosecurity Magazine?