Infosecurity Opinions

  1. The Anatomy of an Insider Threat

    People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism

    1. Photo of Tim De Sousa

      Tim De Sousa

      Senior Director, FTI Consulting

    2. Photo of Kevin Hughes

      Kevin Hughes

      Senior Director, FTI Consulting

  2. Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities

    Satellites provide critical services, meaning cyber-attacks can cause widespread disruption

    1. Photo of Douglas McKee

      Douglas McKee

      principal engineer & director of vulnerability research, Trellix

  3. #HowTo: Reduce Cyber Risks Amid Surging Threats

    Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape

    1. Photo of Terry Olaes

      Terry Olaes

      senior technical director, Skybox Security

  4. The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape

    Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats

    1. Photo of Camellia Chan

      Camellia Chan

      CEO and founder, X-PHY, a Flexxon brand

  5. Taking a Different Approach to Tackle the Cyber Skills Gap

    Cyber professionals continue to walk in search of higher pay and better working conditions, so what can the business do to improve retention?

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  6. #HowTo: Secure AI and its Software Supply Chains

    Dan Conn discusses what needs to be done to secure AI and its software supply chains

    1. Photo of Dan Conn

      Dan Conn

      Developer Advocate, Sonatype

  7. Make Secure-by-Design Possible at University and Beyond

    Amy Baker discusses how secure coding training can become integrated both in college and industry

    1. Photo of Amy Baker

      Amy Baker

      security education evangelist, Security Journey

  8. New State-Wide Privacy Laws Could Have Unintended Consequences for Consumers and Businesses

    Ev Kontsevoy argues the federal government will eventually need to step in for a lasting privacy solution

    1. Photo of Ev Kontsevoy

      Ev Kontsevoy

      CEO, Teleport

  9. Understanding Business Resilience: There’s More to it Than Meets the Eye

    Business resilience goes far beyond having watertight cybersecurity

    1. Photo of Chris Butler

      Chris Butler

      Managing Consultant, Business Resilience, Databarracks

  10. Data Management, it’s Good for Security and the Planet

    Data management is not just going to save you money, but it could also help save the planet

    1. Photo of Ian Thornton-Trump

      Ian Thornton-Trump

      CISO - Cyjax Ltd

  11. #HowTo: Become an Enabler for Change as a CISO

    CISOs must overcome time and resource challenges to become enablers of change within their organization

    1. Photo of Dr Darren Williams

      Dr Darren Williams

      ceo and founder, BlackFog

  12. Businesses Must Move Beyond the Reactive Approach to Cybersecurity

    By shifting to a proactive and more strategic approach, security professionals can build a risk-aware culture in their organization

    1. Photo of Rick Hemsley

      Rick Hemsley

      UK&I Government and Public Sector Cybersecurity Lead, EY

What’s hot on Infosecurity Magazine?