Infosecurity Opinions
Why Healthcare Needs More Than AI to Fight Cyber-Attacks
Matthew Maynard warns that healthcare has unique vulnerabilities that AI alone cannot solve
Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
Health-ISAC's Errol Weiss discusses how healthcare organizations can tackle rising supply chain attacks by Russian ransomware gangs
A CIO’s Diary of GenAI Deployment
Jamf CIO Linh Lam sets out how to overcome security and other challenges when incorporating genAI into business operations
How to Navigate Global Incident Management Regulations
Vikram Kulothungan sets out the various incident management regulations in place across the world, and how CISOs can build a global compliance strategy
Building Cyber Resiliency Through Governance
David Ramirez calls for boards to engage directly with their security team about how the organization will react to a successful attack
How Microsoft Can Improve Trust Following Global IT Outage
Andrew Grotto says Microsoft must act on claims from its recent cybersecurity summit to reduce the risk of events like the CrowdStrike global IT outage
How the New EU Regulatory Landscape Will Impact Software Security
Nuno Teodoro sets out the impact of new EU cybersecurity regulatory requirements on software security, including NIS2, DORA and the CRA
How to Make Security Policies Truly Transparent to Users
Meta's Manish Sinha discusses how to communicate security intentions effectively, striking a delicate balance
How to Prepare for Compliance with the EU’s AI Act
Jan Stappers explains why organizations worldwide must familiarize themselves with the EU AI Act and prepare for compliance
How to Address Healthcare’s Cybercrime Problem
Health ISAC's CSO Errol Weiss discusses the most common attacks targeting healthcare and how to address them
Navigating the Global AI Regulatory Landscape: Essential Insights for CISOs
Vikram Kulothungan outlines the key AI regulatory trends CISOs must be aware of
Building Proactive Cyber Resilience for NIS2 and DORA
Jason Steer discusses how organizations can build proactive cyber resilience to effectively comply with the upcoming NIS2 and DORA regulations
How to Modernize Your Cryptography Ahead of the Quantum Threat
Dr Ali El Kaafarani highlights the actions organizations must take to make their systems quantum secure in light of the new NIST standards
Apple Must Convince Us to Trust AI With Our Data
Jonathan Joseph says that tech solutions designed to address AI privacy concerns must be trusted as well as just effective to work
A Prescription for Disaster: Cyberwarfare’s Threat to Healthcare
Armis' Mohammad Waqas explains why healthcare has become a prime target for nation-state actors and the crucial steps needed to build a robust defense
The Changing Face of Corporate Governance in Cybersecurity
Organizations must build structures that enable active boardroom engagement in cybersecurity
Fact vs. Fiction: Dispelling Zero Trust Misconceptions
It’s time we burst the bubble of the most common Zero Trust myths and set the right narrative in motion
Decoding NIS2 to Secure Your Supply Chain
CrowdStrike's Zeki Turedi highlights how the EU's NIS2 directive will impact UK organizations' approach to supply chain security
Leveraging Trust and Visibility to Comply with New EU Cyber Regulations
Mishcon de Reya lawyers advise organizations to use innovative solutions to enhance visibility and trust in their systems amid upcoming EU cyber regulations
Setting the Tone at the Top to Manage Enterprise Risk
Businesses should establish a clear tone at the top to ensure everyone in the organization understands the significance of cybersecurity