Infosecurity Opinions

  1. Don’t Insure Against Cyber-Risk, Protect Against It

    BSI's Mark Brown argues that Lloyd's decision to exclude systemic cyber risk from coverage offers an opportunity for organizations to become more resilient

    1. Photo of Mark Brown

      Mark Brown

      global managing director, BSI Group

  2. #HowTo: Demand More from MSSPs

    Richard Hollis suggests 10 questions organizations should ask their MSSPs

    1. Photo of Richard Hollis

      Richard Hollis

      CEO, Risk Crew

  3. Mother’s Day Scams: Targeted Attacks on the Rise

    Raj Dasgupta highlights scams for Americans to look out for while purchasing Mother's Day gifts

    1. Photo of Raj Dasgupta

      Raj Dasgupta

      senior director, global advisory, BioCatch

  4. The Evolving Nature of Cybersecurity Careers: How to Stay Ahead of the Curve

    EC Council's Jay Bavisi outlines how the opportunities and skillsets are evolving in cybersecurity

    1. Photo of Jay  Bavisi

      Jay Bavisi

      CEO & President, EC-Council

  5. What Financial Executives Need to Know and Ask About Cybersecurity

    Cameron Over highlights how cybersecurity can be demystified for CFOs

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  6. #HowTo: Mitigate Burnout for Cybersecurity Staff

    Julien Soriano explains why minimizing burnout in cyber professionals is so crucial to organizations' security

  7. A Decade On – What’s Happened to Crowdsourced Security?

    Alex Haynes reflects the impact of crowdsourced security on the cyber industry so far

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  8. Mayday, Mayday our Network is Going Down

    How cybersecurity can learn lessons from aviation’s response to serious incidents

    1. Photo of Lisa Forte

      Lisa Forte

      Partner, Red Goat Cyber Security

  9. The Real Threats and Opportunities of ChatGPT

    There's been a lack of focus on the huge security benefits of ChatGPT, says Cequence's Jason Kent

    1. Photo of Jason Kent

      Jason Kent

      Hacker In Residence, Cequence Security

  10. Why European Space Cybersecurity Matters

    We have an unprecedented opportunity to create a secure ecosystem to protect the critical space sector, says CYSAT's Mathieu Bailly

    1. Photo of Mathieu Bailly

      Mathieu Bailly

      VP Space, Cysec; Director of CYSAT

  11. Pulling Back the Curtain to Address TikTok Security Concerns

    People are key to the success of any cybersecurity plan around TikTok, says ThreatBlockr's Pat McGarry

    1. Photo of Pat McGarry

      Pat McGarry

      CTO, ThreatBlockr

  12. HowTo: Protect Software by Understanding Your Environment

    Software is a big target for cyber-criminals, and organizations must understand their environment to secure it

    1. Photo of Girish Janardhanudu

      Girish Janardhanudu

      vice president, security consulting, Synopsys

  13. Data Security Best-Practice in a World of Evolving Risks and Regulations

    Organizations with a uniform approach to data management and access control can increase their security and compliance

    1. Photo of Sophie Stalla-Bourdillon

      Sophie Stalla-Bourdillon

      senior privacy counsel and legal engineer, Immuta

  14. How Website Tracking Technologies Are Transforming Risk Analysis Across Industries

    The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology

    1. Photo of Lauren Winchester

      Lauren Winchester

      SVP, Risk Advisory, Corvus Insurance

  15. #HowTo: Reduce Risk and Complexity in Cloud Networks

    John Moran discusses how security to move from inhibitor to enabler to organizations multi-cloud strategies

    1. Photo of John Moran

      John Moran

      Technical Director, Business Development, Tufin

  16. Why Security Pros Need to Escape the Cyber Bubble

    The cybersecurity community agrees on so much, but why do we still argue over the same things?

    1. Photo of Mike Thompson

      Mike Thompson

      Information Security Manager - Zen Internet

  17. The Anatomy of an Insider Threat

    People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism

    1. Photo of Tim De Sousa

      Tim De Sousa

      Senior Director, FTI Consulting

    2. Photo of Kevin Hughes

      Kevin Hughes

      Senior Director, FTI Consulting

  18. Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities

    Satellites provide critical services, meaning cyber-attacks can cause widespread disruption

    1. Photo of Douglas McKee

      Douglas McKee

      principal engineer & director of vulnerability research, Trellix

  19. #HowTo: Reduce Cyber Risks Amid Surging Threats

    Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape

    1. Photo of Terry Olaes

      Terry Olaes

      senior technical director, Skybox Security

  20. The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape

    Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats

    1. Photo of Camellia Chan

      Camellia Chan

      CEO and founder, X-PHY, a Flexxon brand

What’s hot on Infosecurity Magazine?