Infosecurity Opinions

  1. Why Healthcare Needs More Than AI to Fight Cyber-Attacks

    Matthew Maynard warns that healthcare has unique vulnerabilities that AI alone cannot solve

    1. Photo of Matthew Maynard

      Matthew Maynard

      Security Operations Specialist, BJC Healthcare

  2. Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks

    Health-ISAC's Errol Weiss discusses how healthcare organizations can tackle rising supply chain attacks by Russian ransomware gangs

    1. Photo of Errol Weiss

      Errol Weiss

      Chief Security Officer, Health-ISAC

  3. A CIO’s Diary of GenAI Deployment

    Jamf CIO Linh Lam sets out how to overcome security and other challenges when incorporating genAI into business operations

    1. Photo of Linh Lam

      Linh Lam

      CIO, Jamf

  4. How to Navigate Global Incident Management Regulations

    Vikram Kulothungan sets out the various incident management regulations in place across the world, and how CISOs can build a global compliance strategy

    1. Photo of Vikram Kulothungan

      Vikram Kulothungan

      Security Expert

  5. Building Cyber Resiliency Through Governance

    David Ramirez calls for boards to engage directly with their security team about how the organization will react to a successful attack

    1. Photo of David Ramirez

      David Ramirez

      CISO, Broadridge

  6. How Microsoft Can Improve Trust Following Global IT Outage

    Andrew Grotto says Microsoft must act on claims from its recent cybersecurity summit to reduce the risk of events like the CrowdStrike global IT outage

    1. Photo of Andrew Grotto

      Andrew Grotto

      Research Fellow, Stanford University

  7. How the New EU Regulatory Landscape Will Impact Software Security

    Nuno Teodoro sets out the impact of new EU cybersecurity regulatory requirements on software security, including NIS2, DORA and the CRA

    1. Photo of Nuno Teodoro

      Nuno Teodoro

      Vice President, Group Cybersecurity, Solaris Group

  8. How to Make Security Policies Truly Transparent to Users

    Meta's Manish Sinha discusses how to communicate security intentions effectively, striking a delicate balance

    1. Photo of Manish Sinha

      Manish Sinha

      Senior Software Engineer, Meta

  9. How to Prepare for Compliance with the EU’s AI Act

    Jan Stappers explains why organizations worldwide must familiarize themselves with the EU AI Act and prepare for compliance

    1. Photo of Jan Stappers

      Jan Stappers

      Director of Regulatory Solutions, Navex

  10. How to Address Healthcare’s Cybercrime Problem

    Health ISAC's CSO Errol Weiss discusses the most common attacks targeting healthcare and how to address them

    1. Photo of Errol Weiss

      Errol Weiss

      Chief Security Officer, Health-ISAC

  11. Navigating the Global AI Regulatory Landscape: Essential Insights for CISOs

    Vikram Kulothungan outlines the key AI regulatory trends CISOs must be aware of

    1. Photo of Vikram Kulothungan

      Vikram Kulothungan

      Security Expert

  12. Building Proactive Cyber Resilience for NIS2 and DORA

    Jason Steer discusses how organizations can build proactive cyber resilience to effectively comply with the upcoming NIS2 and DORA regulations

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  13. How to Modernize Your Cryptography Ahead of the Quantum Threat

    Dr Ali El Kaafarani highlights the actions organizations must take to make their systems quantum secure in light of the new NIST standards

    1. Photo of Dr Ali  El Kaafarani

      Dr Ali El Kaafarani

      Founder and CEO, PQShield

  14. Apple Must Convince Us to Trust AI With Our Data

    Jonathan Joseph says that tech solutions designed to address AI privacy concerns must be trusted as well as just effective to work

    1. Photo of Jonathan Joseph

      Jonathan Joseph

      Board Member, The Ethical Tech Project

  15. A Prescription for Disaster: Cyberwarfare’s Threat to Healthcare

    Armis' Mohammad Waqas explains why healthcare has become a prime target for nation-state actors and the crucial steps needed to build a robust defense

    1. Photo of Mohammad  Waqas

      Mohammad Waqas

      Chief Technology Officer for Healthcare, Armis

  16. The Changing Face of Corporate Governance in Cybersecurity

    Organizations must build structures that enable active boardroom engagement in cybersecurity

    1. Photo of Dr Sean Costigan

      Dr Sean Costigan

      Managing Director of Resilience Strategy, Red Sift

    2. Photo of Annie Searle

      Annie Searle

      Principal, Annie Searle Associates

  17. Fact vs. Fiction: Dispelling Zero Trust Misconceptions

    It’s time we burst the bubble of the most common Zero Trust myths and set the right narrative in motion

    1. Photo of John Kindervag

      John Kindervag

      Creator of Zero Trust and Chief Evangelist Officer at Illumio

  18. Decoding NIS2 to Secure Your Supply Chain

    CrowdStrike's Zeki Turedi highlights how the EU's NIS2 directive will impact UK organizations' approach to supply chain security

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  19. Leveraging Trust and Visibility to Comply with New EU Cyber Regulations

    Mishcon de Reya lawyers advise organizations to use innovative solutions to enhance visibility and trust in their systems amid upcoming EU cyber regulations

    1. Photo of Gavin Ferris

      Gavin Ferris

      CEO, lowRISC

    2. Photo of Anne Rose

      Anne Rose

      Managing Associate, Mishcon de Reya LLP

    3. Photo of Louise Schofield

      Louise Schofield

      Trainee Solicitor, Mishcon de Reya LLP

  20. Setting the Tone at the Top to Manage Enterprise Risk

    Businesses should establish a clear tone at the top to ensure everyone in the organization understands the significance of cybersecurity

    1. Photo of Dr Sean Costigan

      Dr Sean Costigan

      Managing Director of Resilience Strategy, Red Sift

    2. Photo of Annie Searle

      Annie Searle

      Principal, Annie Searle Associates

What’s hot on Infosecurity Magazine?