Infosecurity Opinions

  1. Challenging Old Ideas: The Ongoing Need to Empower Women in Tech

    Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce

    1. Photo of Jen Taylor

      Jen Taylor

      chief product officer, Cloudflare

  2. #CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be

    Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution

    1. Photo of Stu Sjouwerman

      Stu Sjouwerman

      Founder and CEO, KnowBe4

  3. #CyberMonth: Six Steps to Build a Positive Security Culture

    Fred Kwong says effective security culture requires commitment from the top down

    1. Photo of Fred Kwong

      Fred Kwong

      VP, CISO, DeVry University

  4. How to Comply with API Security Requirements in PCI DSS Version 4.0

    Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards

    1. Photo of Corey Ball

      Corey Ball

      chief hacking officer and senior manager, Moss Adams LLP

    2. Photo of Casey Wassom

      Casey Wassom

      cybersecurity senior manager, Moss Adams LLP

  5. Four Data Security Challenges Set to Impact Organizations in the Coming Years

    Steve Durbin sets out how organizations can prepare for significant security risks implicit with data

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  6. No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!

    Alex Haynes highlights the challenges of communicating cybersecurity to a largely non-technical mass audience

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  7. #NITAM: A Surge in Quiet and Loud Quitters Presents New Threats

    Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats

    1. Photo of Elizabeth Harz

      Elizabeth Harz

      CEO, Veriato

  8. How Will the Cyber Pathways Impact Your Career?

    Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  9. Time to Demand IT Security by Design and Default

    Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services

    1. Photo of Toby Sibley

      Toby Sibley

      Security Expert, PA Consulting

  10. Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework

    Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny

    1. Photo of Cédric  Burton

      Cédric Burton

      Partner, Global Co-Chair Privacy and Cybersecurity, Wilson Sonsini

    2. Photo of Tom Evans

      Tom Evans

      Senior Associate, Privacy and Cybersecurity, Wilson Sonsini

  11. How to Prepare for NIS2

    Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  12. Why Businesses Ignore Incident Response at Their Peril

    Phil Robinson explores the dangers around businesses lethargy towards incident response planning

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  13. The Gender Gap is Widening in Cyber – What Can We Do About it?

    Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity

    1. Photo of Kim Wiles

      Kim Wiles

      Government Cyber Services Expert and Product Manager, Nominet

  14. It’s Time to Elevate the Humble SBOM

    Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  15. Navigating the Future with Generative AI: Treating AI as a Trusted Colleague

    Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool

    1. Photo of Craig Civil

      Craig Civil

      Director of Data Science and Artificial Intelligence, BSI Group

  16. Paving a Path to Security by Design Across the Industry

    SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  17. How to Securely Manage the Data of Vulnerable Groups

    Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  18. Why it’s Time to Kick the Password Habit

    The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  19. How to Ensure Cyber Resilience Across the Supply Chain

    Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

    1. Photo of Apu Pavithran

      Apu Pavithran

      CEO and Founder, Hexnode

  20. Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?

    Mike Britton argues that the new strategy is welcome, but could go further

    1. Photo of Mike Britton

      Mike Britton

      CISO, Abnormal Security

What’s hot on Infosecurity Magazine?