Infosecurity Opinions
Navigating the Global AI Regulatory Landscape: Essential Insights for CISOs
Vikram Kulothungan outlines the key AI regulatory trends CISOs must be aware of
Building Proactive Cyber Resilience for NIS2 and DORA
Jason Steer discusses how organizations can build proactive cyber resilience to effectively comply with the upcoming NIS2 and DORA regulations
How to Modernize Your Cryptography Ahead of the Quantum Threat
Dr Ali El Kaafarani highlights the actions organizations must take to make their systems quantum secure in light of the new NIST standards
Apple Must Convince Us to Trust AI With Our Data
Jonathan Joseph says that tech solutions designed to address AI privacy concerns must be trusted as well as just effective to work
A Prescription for Disaster: Cyberwarfare’s Threat to Healthcare
Armis' Mohammad Waqas explains why healthcare has become a prime target for nation-state actors and the crucial steps needed to build a robust defense
The Changing Face of Corporate Governance in Cybersecurity
Organizations must build structures that enable active boardroom engagement in cybersecurity
Fact vs. Fiction: Dispelling Zero Trust Misconceptions
It’s time we burst the bubble of the most common Zero Trust myths and set the right narrative in motion
Decoding NIS2 to Secure Your Supply Chain
CrowdStrike's Zeki Turedi highlights how the EU's NIS2 directive will impact UK organizations' approach to supply chain security
Leveraging Trust and Visibility to Comply with New EU Cyber Regulations
Mishcon de Reya lawyers advise organizations to use innovative solutions to enhance visibility and trust in their systems amid upcoming EU cyber regulations
Setting the Tone at the Top to Manage Enterprise Risk
Businesses should establish a clear tone at the top to ensure everyone in the organization understands the significance of cybersecurity
The Role of Microsegmentation in Strengthening Zero Trust Security
Venkata Nedunoori discusses the connection between microsegmentation and zero trust, and how to implement this component successfully
How to Protect Against Advanced AI Scams
PA Consulting's Paul Whitlock says traditional security controls and actions can still play a big role in protecting against advanced AI scams
Why You Must Consider the Security Risks of BYOD
Microsoft's Alan Slothower discusses the risks posed by increasing BYOD policies in enterprises
The Double-Edged Sword of Generative AI
AI advancements eliminate traditional phishing red flags, allowing cybercriminals to create hyper-realistic attacks via deepfakes and voice notes
How to Build Cyber Resilience in Healthcare
Lauren Winchester explains how healthcare organizations can exhibit strong cyber resilience
AI Must Prove its Trustworthiness
Box CISO Julien Soriano says we must turn our attention to the security and veracity of the data we are feeding into AI models
How Banks Can Safeguard Customers From Romance Fraud
Online dating's rise as the leading way to meet potential partners has created a boom in romance scams, demanding industry solutions to protect users
Why Culture is the Bedrock of Cybersecurity
Ken Deitz explains why culture is the guiding principle for good cyber governance
Three Psychological Theories to Ensure Cybersecurity Training Sticks
Andrew Rose says leveraging behavioral psychology theories will create a much higher success rate in employee cybersecurity training programs
The Data Privacy Risks from Video Surveillance at the Paris Olympics
Vishwa Narayan discusses how authorities can strike the right balance between privacy and security by using video surveillance at the Paris Olympics