Infosecurity Opinions

  1. How to Comply with Ever-Changing Data Protection Regulations

    Katie Simmonds sets out the main challenges organizations face in achieving compliance with data privacy regulations

    1. Photo of Katie  Simmonds

      Katie Simmonds

      Managing Associate, Womble Bond Dickinson

  2. The CISO Journey in 2024: Looking at the Year Ahead

    As security threats grow more sophisticated and new regulations emerge, CISOs face an increasingly challenging job landscape

    1. Photo of Kayla  Williams

      Kayla Williams

      CISO, Devo

  3. Demystifying Cyber Resilience: From Best Practice to Execution

    Francesco Chiarini, founder of High Value Target, explores what cyber resilience truly means for organizations – and how they can achieve it

    1. Photo of Francesco Chiarini

      Francesco Chiarini

      Founder & Chief Researcher, High Value Target

  4. Why Meeting the SEC’s Board Diversity Rules Benefits Your Organization

    Larry Whiteside Jr. explains why increasing the diversity of boardrooms is good for business and security

    1. Photo of Larry  Whiteside Jr

      Larry Whiteside Jr

      Co-Founder and President, Cyversity and CISO, RegScale

  5. Why Centralizing Your Content is Vital for Privacy Compliance

    Box's Leah Perry discusses how organizations can handle fluctuations in privacy laws around the globe

    1. Photo of Leah Perry

      Leah Perry

      Chief Privacy Officer, Box

  6. Organizations Must Embrace Dynamic Honeypots to Outpace Attackers

    Honeypots are no longer effective against sophisticated cyberattacks, and organizations should consider using dynamic AI-based honeypots instead

    1. Photo of Kunal  Anand

      Kunal Anand

      CTO & CISO at Imperva

  7. How to Avoid Fraud on Black Friday

    Cybersecurity experts share tips for consumers, businesses and retailers on protecting against e-commerce scams this Black Friday and Cyber Monday

  8. From Brews to Privacy Blues: Balancing Innovation and Privacy in the Digital Age

    Businesses should follow key takeaways from the Tim Hortons app investigation to strike the right balance between innovation and privacy protection

    1. The Roberts & Obradovic Team

      Roberts * Obradovic

  9. We’ve Come a Long Way in Cybersecurity…But There is a Long Way to Go

    Cybersecurity threats have become more sophisticated, requiring businesses and society as a whole to enhance their awareness and protection measures

    1. Photo of Chris Dimitriadis

      Chris Dimitriadis

      Chief Global Strategy Officer, ISACA

  10. Protection from Chip to Cloud: Tackling Emerging Security Risks in the Age of AI

    Microsoft's Alan Slothower highlights the growing threat to firmware security from generative AI

    1. Photo of Alan Slothower

      Alan Slothower

      Head of Surface Commercial UK, Microsoft

  11. Why Enterprises and Governments Must Prepare for Q-Day Now

    Quantum computers are here and in use - governments and enterprises must protect themselves against the risks

    1. Photo of Chris Johnson

      Chris Johnson

      Senior Vice President & Global Head of Enterprise, Nokia

  12. Forcing Security Expertise on Boards is Not the Answer, Here's What Is

    CISOs should be given a voice at the board table to communicate cybersecurity risks and obtain buy-in for remediation

    1. Photo of Jason Rebholz

      Jason Rebholz

      CISO, Corvus Insurance

  13. #CyberMonth: Strengthening Cybersecurity Resilience by Going Beyond Blame

    Steve Forbes says human intelligence will be indispensable in the battle against AI-based phishing attacks

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  14. 3 Things CISOs Should Be Doing This Cybersecurity Awareness Month and Beyond

    Cybersecurity Awareness Month is a pivotal time to assess your enterprise's cybersecurity posture beyond the basics of multi-factor authentication, strong passwords, and up-to-date software

    1. Photo of Michael Armer

      Michael Armer

      CISO, RingCentral

  15. Preserving Digital Trust in an Era of Rapidly Evolving Threats

    Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats

    1. Photo of Linda Betz

      Linda Betz

      Acting CISO, FS-ISAC

  16. Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout

    Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats

    1. Photo of Mark Wojtasiak

      Mark Wojtasiak

      VP of Product Strategy, Vectra AI

  17. Responsible Cyber Operations: From Theory to Reality

    Nick Beecroft discusses how to create a doctrine for being a responsible cyber power

    1. Photo of Nick Beecroft

      Nick Beecroft

      International Cybersecurity Lead, BAE Systems

  18. Are Tabletop Exercises Still Relevant for Modern Cybersecurity?

    Dotan Nahum sets out how to make the most of tabletop exercises in 2023 and beyond

    1. Photo of Dotan Nahum

      Dotan Nahum

      Head of Developer-First Security, Check Point Software Technologies

  19. How the Rise of Deepfakes Will Impact the 2024 Presidential Elections

    Blair Cohen says it is time to harness AI’s power to minimize the impact deepfakes could have on the democratic process

    1. Photo of Blair Cohen

      Blair Cohen

      President & Founder, AuthenticID

  20. #CyberMonth: Why Boardrooms Need a Stronger CISO Influence

    Tony Buffomante discusses how to break the ice between cyber experts and board members

    1. Photo of Tony Buffomante

      Tony Buffomante

      global head of cybersecurity and risk services, Wipro

What’s hot on Infosecurity Magazine?