Infosecurity Opinions

  1. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  2. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  3. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

  4. Padding Users’ Defenses Against ChatGPT

    FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  5. #HowTo: Create and Maintain SBOMs

    Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  6. Why Apps Like TikTok Can Be a Security Issue for Your Business

    Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment

    1. Photo of Frank Johnson

      Frank Johnson

      vice president of US Federal, Lookout Inc

  7. The Open-Source Software in Our Pockets Needs Our Help

    Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb

    1. Photo of Jacobo McGuire

      Jacobo McGuire

      policy research intern, Chainguard

    2. Photo of John Speed Meyers

      John Speed Meyers

      principal security scientist, Chainguard

  8. #HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises

    Jim Nitterauer argues that by thinking outside the box, MSEs can manage risk with less staff, limited security tools and smaller budgets

    1. Photo of Jim Nitterauer

      Jim Nitterauer

      director, information security, Graylog

  9. Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

    Rising attacks targeting the gaming sector are undermining consumer trust and decreasing sales

    1. Photo of Andrew Whaley

      Andrew Whaley

      senior technical director, Promon

  10. Insider Threats in the Work from Home Age

    Christos Flessas explains why the shift to remote work has increased insider threat risks to organizations

    1. Photo of Christos Flessas

      Christos Flessas

      Communications and Information Systems Engineer, Hellenic Air Force

  11. Why the UK Government Must End its Senseless Encryption Demands

    Will UK government plans to ban end-to-end encryption in messaging services damage consumers' privacy and security?

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  12. #HowTo: Improve Your Cyber Resilience

    SecurityScorecard's Alexander Heid sets out four steps to improve your organization's cyber resilience

    1. Photo of Alexander Heid

      Alexander Heid

      chief research and development officer, SecurityScorecard

  13. Navigating AI Job Losses: Balancing Progress and Social Responsibility

    Nikki Webb explores the ethical implications of job losses due to AI, with a focus on the personal impact on individuals

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  14. ChatGPT: Not All Gloom and Doom for Security Professionals

    Chris Jacobs urges the security community to stop focusing solely on the risks of ChatGPT, and start looking at the potential gains

    1. Photo of Chris Jacob

      Chris Jacob

      global vice president, threat intelligence engineers, ThreatQuotient

  15. GDPR Fines: Are They Working?

    While regulators could increase fines for breaching the GDPR, ultimately, it will be the public that makes big tech take notice, says Alison Berryman

    1. Photo of Alison Berryman

      Alison Berryman

      senior managing lawyer, Biztech Lawyers

  16. Understanding Theories and Biases to Better Inform Security Decisions

    Keavy Murphy says security leaders should leverage theories that impact every business unit to demonstrate the impact of a data breach

    1. Photo of Keavy Murphy

      Keavy Murphy

      Senior Director of Security, Starburst Data

  17. ChatGPT Can Be Used to Create Malware: Here’s How

    The malicious use of ChatGPT’s API within malware can present significant challenges for security professionals

    1. Photo of Eran Shimony

      Eran Shimony

      Principal Cyber Researcher, CyberArk

  18. #HowTo: Improve Your Website Security

    David Strauss highlights areas to focus on to improve security approaches in WebOps

    1. Photo of David Strauss

      David Strauss

      CTO and co-founder, Pantheon

  19. Why Trust and Evidence Are the New Frontiers of Open-Source Risk

    Brian Dye says we must open our eyes to the risks of open-source software without limiting its huge business benefits

    1. Photo of Brian Dye

      Brian Dye

      CEO, Corelight

  20. Understanding the Role of CISOs, CTOs and CIOs in Cybersecurity

    The roles of security leaders have undergone drastic changes in recent years

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

What’s hot on Infosecurity Magazine?