Infosecurity Opinions

  1. How to Integrate Business Security Systems

    Is it better to buy a multi-functional suite with all the features or separate technology for the different areas you need to protect?

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  2. Passwordless Authentication is Finally on the Horizon

    Will the new year continue a trend of passwordless authentication?

    1. Photo of Raz Rafaeli

      Raz Rafaeli

      CEO of Secret Double Octopus

  3. The Best Data Breach Tactics to Deploy Now

    Two tactics to raise the bar of security to protect yourself and discourage attackers.

    1. Photo of Arshad Noor

      Arshad Noor

      CTO, StrongKey

  4. Fight Phishing with Benchmarking and Simulation Training

    Benchmarking is an extremely valuable tool for figuring out how your organization is thwarting phishing attacks.

    1. Photo of Dennis Dillman

      Dennis Dillman

      VP of Product Management and Security Awareness, Barracuda Networks

  5. No Target is Too Small: Why SMEs Must be Cyber-Resilient

    Smaller businesses are more vulnerable to cyber-attacks than enterprises, and so need to be more cybersecurity-savvy.

    1. Photo of Marc Wilczek

      Marc Wilczek

      Chief Operating Officer, Link11

  6. Guest Editor: A Passion for Cybersecurity

    Cybersecurity is one of those careers that engenders real job satisfaction and passion amongst those working in the industry

    1. Photo of James Lyne

      James Lyne

      Head of Research and Development, SANS Institute

  7. #2018InReview Malware and Threats

    A look back at the rocky road of 2018's threats, attacks and malware.

    1. Photo of Sean Sullivan

      Sean Sullivan

      Security Advisor, F-Secure

  8. Guest Editor: Tackling the Growth of BEC Attacks

    By addressing the problems of cybersecurity at the technical, physical and human level, we are putting ourselves in the best position to resist BEC

    1. Photo of Jessica  Barker

      Jessica Barker

      Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

  9. Guest Editor: Breaking the Barriers of Security

    I have come to embrace that these barriers have helped shape the budding security professional I am today

    1. Photo of Sophia McCall

      Sophia McCall

      Cyber Security Student, Pen-Testing Intern/Junior Security Consultant

  10. #2018InReview Application Security and Software Development

    2019 should be the year organizations look inward to make securing their own software and applications.

    1. Photo of Paul Farrington

      Paul Farrington

      Director, EMEA solution architects, Veracode

  11. Guest Editor: Our Cyber Glass Ceiling

    Our choice is very simple, we can either bemoan the status quo or identify an approach that allows us to articulate our business value in a quantifiable way

    1. Photo of Raj Samani

      Raj Samani

      Chief Scientist and McAfee Fellow, McAfee

  12. #2018InReview Compliance and GDPR

    Looking at the year in compliance, the impact of GDPR and how much more the DPO needs to play a role in the business.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  13. #2018InReview IoT Security

    How did IoT security improve, or not, over the past 12 months?

    1. Photo of David Dufour

      David Dufour

      Vice President of Engineering & Cybersecurity, Webroot

  14. #2018InReview Women and Diversity in Cybersecurity

    In 2018, the industry began waking up to diversity in all its forms – experience, thinking, age, gender, ethnicity.

    1. Photo of Jane Frankland

      Jane Frankland

      Founder of Cybersecurity Capital and the IN Security Movement

  15. #2018InReview Security Culture

    How much did security culture levels improve in 2018, and what were the determining factors if so?

    1. Photo of Aimee Laycock

      Aimee Laycock

      COO, CLTRe

  16. Why the CISO’s Voice Must be Heard Beyond the IT Department

    A CISO needs empowerment to influence budget decisions, project decisions and even IT decisions

    1. Michalis Kamprianis

      CISO, Strategist, International Speaker

  17. #2018InReview Government Security

    Looking back at the year in government security, in compliance, legislation and when two cities were locked down by ransomware.

    1. Photo of Jim Varner

      Jim Varner

      CEO, SecurityFirst

  18. #2018InReview Cloud Security

    Spending in cloud security increased in 2018, as IaaS platforms became the norm.

    1. Photo of Darron Gibbard

      Darron Gibbard

      Chief Technical Security Officer, Qualys

  19. #2018InReview Subtle Shifts in Financial Services Security

    While compliance dominated 2018, subtle shifts affected financial services security too.

    1. Photo of Stephen Bonner

      Stephen Bonner

      Cyber Risk Partner, Deloitte

  20. #2018InReview Healthcare Cybersecurity

    How 2018 proved to be a constant challenge for those in healthcare cybersecurity.

    1. Photo of Tom Gilheany

      Tom Gilheany

      Portfolio manager of security training and certifications, Cisco Services

What’s hot on Infosecurity Magazine?