Infosecurity Opinions

  1. How to Ensure Cyber Resilience Across the Supply Chain

    Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

    1. Photo of Apu Pavithran

      Apu Pavithran

      CEO and Founder, Hexnode

  2. Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?

    Mike Britton argues that the new strategy is welcome, but could go further

    1. Photo of Mike Britton

      Mike Britton

      CISO, Abnormal Security

  3. The Impact of Artificial Intelligence on Software Development

    Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

    1. Photo of Jamie Boote

      Jamie Boote

      associate principal consultant, Synopsys

  4. HowTo: Challenge Deepfake Fraud

    Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

    1. Photo of Alisdair Faulkner

      Alisdair Faulkner

      founder and CEO, Darwinium

  5. Mythbusting Through the AI Noise in Cyber: What You Need to Know

    Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  6. State of the Nation: Exploring the UK Cyber Landscape

    Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

    1. Photo of Deryck Mitchelson

      Deryck Mitchelson

      Head of Global CISOs & C-Suite Advisor, Check Point Software

  7. How to Create a Culture of Incident Reporting

    Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  8. Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect

    Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

    1. Photo of Carsten Rhod Gregersen

      Carsten Rhod Gregersen

      CEO and Founder, Nabto

  9. A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance

    The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  10. Four Cybersecurity Roles for CFOs

    Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  11. How to Tackle Deepfakes and Manipulation

    Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  12. Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises

    Igor Volovich says its time for a paradigm shift in compliance strategies

    1. Photo of Igor Volovich

      Igor Volovich

      VP of Compliance Strategy, Qmulos

  13. Pandemic Development Risks Non-Compliance with White House Guidelines

    Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy

    1. Photo of Meredith Bell

      Meredith Bell

      CEO, AutoRABIT

  14. How To Prevent Ransomware Attackers Striking Again

    Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

    1. Photo of Charles Smith

      Charles Smith

      Consulting Solutions Engineer, Data Protection, Barracuda

  15. Reviewing the UK Government Call for Views on Supply Chain Threats

    Michael Smith says that open dialogue is the first step to improving supply chain security

    1. Photo of Michael Smith

      Michael Smith

      Field CTO, Vercara

  16. Generative AI: Friend or Foe?

    Joe Partlow assesses the security threats and benefits of generative AI

    1. Photo of Joe Partlow

      Joe Partlow

      Chief Technology Officer, ReliaQuest

  17. NATO Countries Must Work Together to Counter the Russian Cyber-Threat

    William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like

    1. Photo of William Hutchison

      William Hutchison

      CEO, SimSpace

  18. How To Create an Effective Patch Management Program

    Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  19. How Has GDPR Changed Our Approach to Data Protection?

    Prof Kevin Curran discusses how the GDPR has changed organizations' security practices

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  20. How AI Will Change Red Teaming

    Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

What’s Hot on Infosecurity Magazine?