Infosecurity Opinions

  1. Learning from 2024: An Unprecedented Exploitation of Remote Access Technologies

    Paolo Passeri discusses the unprecedented number of exploitation of remote access technologies in 2024, and how organizations can boost their security against such incidents

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. Top CISO Focuses for Navigating Cybersecurity in 2025

    PA Consulting experts say that data governance and securing AI should be among the key focuses for CISOs in 2025

    1. Photo of Laura Hawkins

      Laura Hawkins

      Digital Trust Specialist, PA Consulting

    2. Photo of Elliot Rose

      Elliot Rose

      Cyber Security Expert, PA Consulting

  3. 2025: A Critical Year for Cybersecurity Compliance in the EU and UK

    Lawyers from Clifford Chance highlight the cybersecurity legislative updates in 2024 that EU and UK businesses must be prepared for

    1. Photo of Patrice Navarro

      Patrice Navarro

      Partner, Clifford Chance

    2. Photo of Oscar  Tang

      Oscar Tang

      Senior Associate, Clifford Chance

  4. 2025 to be a Year of Reckoning for AI in Cybersecurity

    Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the technology

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  5. Using Shorter Public Certificate Lifespans to Prepare for Post-Quantum Cryptography

    Kevin Bocek highlights similarities between the shift to shorter public certificate lifespans and the transition to post-quantum cryptography

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi, a CyberArk Company

  6. Your Business is Exposed on the Dark Web: What to do About it

    Emma Zaballos explains how businesses can take control of their data and assets available on the dark web

    1. Photo of Emma Zaballos

      Emma Zaballos

      Senior Researcher, CyCognito

  7. Enterprise Security Architecture: A Quality Management and Resilience Enhancer

    National Highways' Michael Brass highlights the strategic importance of enterprise security architecture

    1. Photo of Dr Michael Brass

      Dr Michael Brass

      Head of Enterprise Security Architecture, National Highways

  8. The Quantum Conundrum: Navigating the Next Big Leap Forward

    Google Cloud CISO Phil Venables sets out how to ensure a smooth transition to quantum-resistant cryptography

    1. Photo of Phil Venables

      Phil Venables

      CISO, Google Cloud

  9. From Patchwork to Framework: Towards a Global IoT Security Paradigm

    Arun Narasimhan discusses the Connectivity Standards Alliance (CSA)'s efforts to offer a unified approach to IoT security

    1. Photo of Arun Narasimhan

      Arun Narasimhan

      Senior Software Engineer, Google

  10. Adopting ISO 27001’s New Rules for a Connected World

    Andy Brophy sets out the key changes to ISO 27001 that organizations need to understand and implement

    1. Photo of Andy Brophy

      Andy Brophy

      ISO 27001 Consultant and Founder of Inavate Consulting

  11. Why Healthcare Needs More Than AI to Fight Cyber-Attacks

    Matthew Maynard warns that healthcare has unique vulnerabilities that AI alone cannot solve

    1. Photo of Matthew Maynard

      Matthew Maynard

      Security Operations Specialist, BJC Healthcare

  12. Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks

    Health-ISAC's Errol Weiss discusses how healthcare organizations can tackle rising supply chain attacks by Russian ransomware gangs

    1. Photo of Errol Weiss

      Errol Weiss

      Chief Security Officer, Health-ISAC

  13. A CIO’s Diary of GenAI Deployment

    Jamf CIO Linh Lam sets out how to overcome security and other challenges when incorporating genAI into business operations

    1. Photo of Linh Lam

      Linh Lam

      CIO, Jamf

  14. How to Navigate Global Incident Management Regulations

    Vikram Kulothungan sets out the various incident management regulations in place across the world, and how CISOs can build a global compliance strategy

    1. Photo of Vikram Kulothungan

      Vikram Kulothungan

      Security Expert

  15. Building Cyber Resiliency Through Governance

    David Ramirez calls for boards to engage directly with their security team about how the organization will react to a successful attack

    1. Photo of David Ramirez

      David Ramirez

      CISO, Broadridge

  16. How Microsoft Can Improve Trust Following Global IT Outage

    Andrew Grotto says Microsoft must act on claims from its recent cybersecurity summit to reduce the risk of events like the CrowdStrike global IT outage

    1. Photo of Andrew Grotto

      Andrew Grotto

      Research Fellow, Stanford University

  17. How the New EU Regulatory Landscape Will Impact Software Security

    Nuno Teodoro sets out the impact of new EU cybersecurity regulatory requirements on software security, including NIS2, DORA and the CRA

    1. Photo of Nuno Teodoro

      Nuno Teodoro

      Vice President, Group Cybersecurity, Solaris Group

  18. How to Make Security Policies Truly Transparent to Users

    Meta's Manish Sinha discusses how to communicate security intentions effectively, striking a delicate balance

    1. Photo of Manish Sinha

      Manish Sinha

      Senior Software Engineer, Meta

  19. How to Prepare for Compliance with the EU’s AI Act

    Jan Stappers explains why organizations worldwide must familiarize themselves with the EU AI Act and prepare for compliance

    1. Photo of Jan Stappers

      Jan Stappers

      Director of Regulatory Solutions, Navex

  20. How to Address Healthcare’s Cybercrime Problem

    Health ISAC's CSO Errol Weiss discusses the most common attacks targeting healthcare and how to address them

    1. Photo of Errol Weiss

      Errol Weiss

      Chief Security Officer, Health-ISAC

What’s hot on Infosecurity Magazine?