Infosecurity Opinions
State of the Nation: Exploring the UK Cyber Landscape
Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks
How to Create a Culture of Incident Reporting
Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders
Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect
Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work
A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance
The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches
Four Cybersecurity Roles for CFOs
Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity
How to Tackle Deepfakes and Manipulation
Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes
Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises
Igor Volovich says its time for a paradigm shift in compliance strategies
Pandemic Development Risks Non-Compliance with White House Guidelines
Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy
How To Prevent Ransomware Attackers Striking Again
Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring
Reviewing the UK Government Call for Views on Supply Chain Threats
Michael Smith says that open dialogue is the first step to improving supply chain security
Generative AI: Friend or Foe?
Joe Partlow assesses the security threats and benefits of generative AI
NATO Countries Must Work Together to Counter the Russian Cyber-Threat
William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like
How To Create an Effective Patch Management Program
Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs
How Has GDPR Changed Our Approach to Data Protection?
Prof Kevin Curran discusses how the GDPR has changed organizations' security practices
How AI Will Change Red Teaming
Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers
Achieving Cyber Resilience in Undersea Cable Networks
Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables
#HowTo: Limit the Impact of Data Breaches
Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents
Understanding the Growing Professionalism of Cyber-Criminals
Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack
Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention
Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind
#HowTo: Protect Organizations Against ChatGPT Cyber-Threats
Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats