Infosecurity Opinions

  1. #HowTo: Reduce Cyber Risks Amid Surging Threats

    Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape

    1. Photo of Terry Olaes

      Terry Olaes

      senior technical director, Skybox Security

  2. The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape

    Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats

    1. Photo of Camellia Chan

      Camellia Chan

      CEO and founder, X-PHY, a Flexxon brand

  3. Taking a Different Approach to Tackle the Cyber Skills Gap

    Cyber professionals continue to walk in search of higher pay and better working conditions, so what can the business do to improve retention?

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  4. #HowTo: Secure AI and its Software Supply Chains

    Dan Conn discusses what needs to be done to secure AI and its software supply chains

    1. Photo of Dan Conn

      Dan Conn

      Developer Advocate, Sonatype

  5. Make Secure-by-Design Possible at University and Beyond

    Amy Baker discusses how secure coding training can become integrated both in college and industry

    1. Photo of Amy Baker

      Amy Baker

      security education evangelist, Security Journey

  6. New State-Wide Privacy Laws Could Have Unintended Consequences for Consumers and Businesses

    Ev Kontsevoy argues the federal government will eventually need to step in for a lasting privacy solution

    1. Photo of Ev Kontsevoy

      Ev Kontsevoy

      CEO, Teleport

  7. Understanding Business Resilience: There’s More to it Than Meets the Eye

    Business resilience goes far beyond having watertight cybersecurity

    1. Photo of Chris Butler

      Chris Butler

      Managing Consultant, Business Resilience, Databarracks

  8. Data Management, it’s Good for Security and the Planet

    Data management is not just going to save you money, but it could also help save the planet

    1. Photo of Ian Thornton-Trump

      Ian Thornton-Trump

      CISO - Cyjax Ltd

  9. #HowTo: Become an Enabler for Change as a CISO

    CISOs must overcome time and resource challenges to become enablers of change within their organization

    1. Photo of Dr Darren Williams

      Dr Darren Williams

      ceo and founder, BlackFog

  10. Businesses Must Move Beyond the Reactive Approach to Cybersecurity

    By shifting to a proactive and more strategic approach, security professionals can build a risk-aware culture in their organization

    1. Photo of Rick Hemsley

      Rick Hemsley

      UK&I Government and Public Sector Cybersecurity Lead, EY

  11. Cyber Warfare is Upon Us: Why the Next Generation of ‘War Games’ so Important

    Modern businesses are increasingly used as pawns in cyber battles between nation-states and affiliated groups

    1. Photo of Avishai Avivi

      Avishai Avivi

      CISO, SafeBreach

  12. #HowTo: Improve Your Company’s Cybersecurity Training

    With human error responsible for 95% of cybersecurity breaches, it's crucial that companies enhance their cyber training programs

    1. Photo of Chrystal Taylor

      Chrystal Taylor

      Head Geek™, Senior Technical Product Marketing Manager, SolarWinds

  13. 5 Reasons Why Cyber Matters for CFOs

    There is a growing imperative for CFOs and OCFO teams to increase their cyber acumen and work closer with CISOs

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  14. Over a Year of Log4j Lingering: Why We Need to Stop Viewing High-Severity Breaches as Anomalies

    Steven Stone explains why we won't see the back of vulnerabilities like Log4j for some time

    1. Photo of Steven Stone

      Steven Stone

      head of Rubrik Zero Labs, Rubrik

  15. Why Cyber Mindfulness is the Future of Cybersecurity

    Yvonne Eskenzi discusses how mindfulness can reduce the risk of stress and burnout in cybersecurity professionals

    1. Photo of Yvonne Eskenzi

      Yvonne Eskenzi

      co-founder, The Zensory

  16. #HowTo: Create an Effective Red Team

    Red teaming is now a common element of cybersecurity, but organization must ensure the teams they work with meet certain requirements

    1. Photo of Kenny On

      Kenny On

      cyber security specialist, CYE

  17. Regulations for SBOMs are Useless if You Cannot Take Action

    SBOMs must be actionable and enforceable to have a significant impact in improving software security

    1. Photo of Moshe Bar

      Moshe Bar

      co-founder and CEO, Codenotary

  18. QR Codes: A Growing Vulnerability to Cybercrimes

    NCC's Rick Crandall discusses how cyber-criminals are leveraging QR codes to launch attacks and advice for consumers to avoid becoming victims

    1. Photo of Rick Crandall

      Rick Crandall

      chairman, cyber committee, National Cybersecurity Center (NCC)

  19. The Race Against Quantum: It’s Not Too Late to be the Tortoise that Beat the Hare

    The race to defend against cyber threats brought on by quantum computing is on, and Jon France, CISO of (ISC)2, says the cyber industry must catch up

    1. Photo of Jon France

      Jon France

      CISO, ISC2

  20. #HowTo: Fight the Use of Deepfakes in ID Theft

    The ability to tell fake content from reality and how this applies to our online identities is a growing challenge amid the rise of deepfakes

    1. Photo of Victor Fredung

      Victor Fredung

      CEO, Shufti Pro

What’s hot on Infosecurity Magazine?