Infosecurity Opinions
Challenging Old Ideas: The Ongoing Need to Empower Women in Tech
Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce
#CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be
Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution
#CyberMonth: Six Steps to Build a Positive Security Culture
Fred Kwong says effective security culture requires commitment from the top down
How to Comply with API Security Requirements in PCI DSS Version 4.0
Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards
Four Data Security Challenges Set to Impact Organizations in the Coming Years
Steve Durbin sets out how organizations can prepare for significant security risks implicit with data
No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!
Alex Haynes highlights the challenges of communicating cybersecurity to a largely non-technical mass audience
#NITAM: A Surge in Quiet and Loud Quitters Presents New Threats
Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats
How Will the Cyber Pathways Impact Your Career?
Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals
Time to Demand IT Security by Design and Default
Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services
Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework
Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny
How to Prepare for NIS2
Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024
Why Businesses Ignore Incident Response at Their Peril
Phil Robinson explores the dangers around businesses lethargy towards incident response planning
The Gender Gap is Widening in Cyber – What Can We Do About it?
Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity
It’s Time to Elevate the Humble SBOM
Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative
Navigating the Future with Generative AI: Treating AI as a Trusted Colleague
Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool
Paving a Path to Security by Design Across the Industry
SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals
How to Securely Manage the Data of Vulnerable Groups
Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups
Why it’s Time to Kick the Password Habit
The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption
How to Ensure Cyber Resilience Across the Supply Chain
Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks
Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?
Mike Britton argues that the new strategy is welcome, but could go further