Infosecurity Opinions
Learning from 2024: An Unprecedented Exploitation of Remote Access Technologies
Paolo Passeri discusses the unprecedented number of exploitation of remote access technologies in 2024, and how organizations can boost their security against such incidents
Top CISO Focuses for Navigating Cybersecurity in 2025
PA Consulting experts say that data governance and securing AI should be among the key focuses for CISOs in 2025
2025: A Critical Year for Cybersecurity Compliance in the EU and UK
Lawyers from Clifford Chance highlight the cybersecurity legislative updates in 2024 that EU and UK businesses must be prepared for
2025 to be a Year of Reckoning for AI in Cybersecurity
Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the technology
Using Shorter Public Certificate Lifespans to Prepare for Post-Quantum Cryptography
Kevin Bocek highlights similarities between the shift to shorter public certificate lifespans and the transition to post-quantum cryptography
Your Business is Exposed on the Dark Web: What to do About it
Emma Zaballos explains how businesses can take control of their data and assets available on the dark web
Enterprise Security Architecture: A Quality Management and Resilience Enhancer
National Highways' Michael Brass highlights the strategic importance of enterprise security architecture
The Quantum Conundrum: Navigating the Next Big Leap Forward
Google Cloud CISO Phil Venables sets out how to ensure a smooth transition to quantum-resistant cryptography
From Patchwork to Framework: Towards a Global IoT Security Paradigm
Arun Narasimhan discusses the Connectivity Standards Alliance (CSA)'s efforts to offer a unified approach to IoT security
Adopting ISO 27001’s New Rules for a Connected World
Andy Brophy sets out the key changes to ISO 27001 that organizations need to understand and implement
Why Healthcare Needs More Than AI to Fight Cyber-Attacks
Matthew Maynard warns that healthcare has unique vulnerabilities that AI alone cannot solve
Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
Health-ISAC's Errol Weiss discusses how healthcare organizations can tackle rising supply chain attacks by Russian ransomware gangs
A CIO’s Diary of GenAI Deployment
Jamf CIO Linh Lam sets out how to overcome security and other challenges when incorporating genAI into business operations
How to Navigate Global Incident Management Regulations
Vikram Kulothungan sets out the various incident management regulations in place across the world, and how CISOs can build a global compliance strategy
Building Cyber Resiliency Through Governance
David Ramirez calls for boards to engage directly with their security team about how the organization will react to a successful attack
How Microsoft Can Improve Trust Following Global IT Outage
Andrew Grotto says Microsoft must act on claims from its recent cybersecurity summit to reduce the risk of events like the CrowdStrike global IT outage
How the New EU Regulatory Landscape Will Impact Software Security
Nuno Teodoro sets out the impact of new EU cybersecurity regulatory requirements on software security, including NIS2, DORA and the CRA
How to Make Security Policies Truly Transparent to Users
Meta's Manish Sinha discusses how to communicate security intentions effectively, striking a delicate balance
How to Prepare for Compliance with the EU’s AI Act
Jan Stappers explains why organizations worldwide must familiarize themselves with the EU AI Act and prepare for compliance
How to Address Healthcare’s Cybercrime Problem
Health ISAC's CSO Errol Weiss discusses the most common attacks targeting healthcare and how to address them