Infosecurity Opinions

  1. Understanding the Growing Professionalism of Cyber-Criminals

    Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack

    1. Photo of Melissa Bischoping

      Melissa Bischoping

      Director of Endpoint Security Research, Tanium

  2. Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention

    Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  3. #HowTo: Protect Organizations Against ChatGPT Cyber-Threats

    Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats

    1. Photo of Jesper Trolle

      Jesper Trolle

      CEO, Exclusive Networks

  4. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  5. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  6. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

  7. Padding Users’ Defenses Against ChatGPT

    FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  8. #HowTo: Create and Maintain SBOMs

    Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  9. Why Apps Like TikTok Can Be a Security Issue for Your Business

    Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment

    1. Photo of Frank Johnson

      Frank Johnson

      vice president of US Federal, Lookout Inc

  10. The Open-Source Software in Our Pockets Needs Our Help

    Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb

    1. Photo of Jacobo McGuire

      Jacobo McGuire

      policy research intern, Chainguard

    2. Photo of John Speed Meyers

      John Speed Meyers

      principal security scientist, Chainguard

  11. #HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises

    Jim Nitterauer argues that by thinking outside the box, MSEs can manage risk with less staff, limited security tools and smaller budgets

    1. Photo of Jim Nitterauer

      Jim Nitterauer

      director, information security, Graylog

  12. Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

    Rising attacks targeting the gaming sector are undermining consumer trust and decreasing sales

    1. Photo of Andrew Whaley

      Andrew Whaley

      senior technical director, Promon

  13. Insider Threats in the Work from Home Age

    Christos Flessas explains why the shift to remote work has increased insider threat risks to organizations

    1. Photo of Christos Flessas

      Christos Flessas

      Communications and Information Systems Engineer, Hellenic Air Force

  14. Why the UK Government Must End its Senseless Encryption Demands

    Will UK government plans to ban end-to-end encryption in messaging services damage consumers' privacy and security?

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  15. #HowTo: Improve Your Cyber Resilience

    SecurityScorecard's Alexander Heid sets out four steps to improve your organization's cyber resilience

    1. Photo of Alexander Heid

      Alexander Heid

      chief research and development officer, SecurityScorecard

  16. Navigating AI Job Losses: Balancing Progress and Social Responsibility

    Nikki Webb explores the ethical implications of job losses due to AI, with a focus on the personal impact on individuals

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  17. ChatGPT: Not All Gloom and Doom for Security Professionals

    Chris Jacobs urges the security community to stop focusing solely on the risks of ChatGPT, and start looking at the potential gains

    1. Photo of Chris Jacob

      Chris Jacob

      global vice president, threat intelligence engineers, ThreatQuotient

  18. GDPR Fines: Are They Working?

    While regulators could increase fines for breaching the GDPR, ultimately, it will be the public that makes big tech take notice, says Alison Berryman

    1. Photo of Alison Berryman

      Alison Berryman

      senior managing lawyer, Biztech Lawyers

  19. Understanding Theories and Biases to Better Inform Security Decisions

    Keavy Murphy says security leaders should leverage theories that impact every business unit to demonstrate the impact of a data breach

    1. Photo of Keavy Murphy

      Keavy Murphy

      Senior Director of Security, Starburst Data

  20. ChatGPT Can Be Used to Create Malware: Here’s How

    The malicious use of ChatGPT’s API within malware can present significant challenges for security professionals

    1. Photo of Eran Shimony

      Eran Shimony

      Principal Cyber Researcher, CyberArk

What’s hot on Infosecurity Magazine?