Infosecurity Opinions

  1. The Impact of Artificial Intelligence on Software Development

    Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

    1. Photo of Jamie Boote

      Jamie Boote

      associate principal consultant, Synopsys

  2. HowTo: Challenge Deepfake Fraud

    Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

    1. Photo of Alisdair Faulkner

      Alisdair Faulkner

      founder and CEO, Darwinium

  3. Mythbusting Through the AI Noise in Cyber: What You Need to Know

    Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  4. State of the Nation: Exploring the UK Cyber Landscape

    Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

    1. Photo of Deryck Mitchelson

      Deryck Mitchelson

      Field CISO EMEA, Check Point Software Technologies

  5. How to Create a Culture of Incident Reporting

    Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  6. Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect

    Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

    1. Photo of Carsten Rhod Gregersen

      Carsten Rhod Gregersen

      CEO and Founder, Nabto

  7. A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance

    The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  8. Four Cybersecurity Roles for CFOs

    Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  9. How to Tackle Deepfakes and Manipulation

    Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  10. Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises

    Igor Volovich says its time for a paradigm shift in compliance strategies

    1. Photo of Igor Volovich

      Igor Volovich

      VP of Compliance Strategy, Qmulos

  11. Pandemic Development Risks Non-Compliance with White House Guidelines

    Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy

    1. Photo of Meredith Bell

      Meredith Bell

      CEO, AutoRABIT

  12. How To Prevent Ransomware Attackers Striking Again

    Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

    1. Photo of Charles Smith

      Charles Smith

      Consulting Solutions Engineer, Data Protection, Barracuda

  13. Reviewing the UK Government Call for Views on Supply Chain Threats

    Michael Smith says that open dialogue is the first step to improving supply chain security

    1. Photo of Michael Smith

      Michael Smith

      Field CTO, Vercara

  14. Generative AI: Friend or Foe?

    Joe Partlow assesses the security threats and benefits of generative AI

    1. Photo of Joe Partlow

      Joe Partlow

      Chief Technology Officer, ReliaQuest

  15. NATO Countries Must Work Together to Counter the Russian Cyber-Threat

    William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like

    1. Photo of William Hutchison

      William Hutchison

      CEO, SimSpace

  16. How To Create an Effective Patch Management Program

    Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  17. How Has GDPR Changed Our Approach to Data Protection?

    Prof Kevin Curran discusses how the GDPR has changed organizations' security practices

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  18. How AI Will Change Red Teaming

    Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  19. Achieving Cyber Resilience in Undersea Cable Networks

    Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables

    1. Photo of Chris Moore

      Chris Moore

      VP Defence & Security and CISO, OneWeb

  20. #HowTo: Limit the Impact of Data Breaches

    Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

What’s hot on Infosecurity Magazine?