Infosecurity Opinions
#HowTo: Improve Your Website Security
David Strauss highlights areas to focus on to improve security approaches in WebOps
Why Trust and Evidence Are the New Frontiers of Open-Source Risk
Brian Dye says we must open our eyes to the risks of open-source software without limiting its huge business benefits
Understanding the Role of CISOs, CTOs and CIOs in Cybersecurity
The roles of security leaders have undergone drastic changes in recent years
Don’t Insure Against Cyber-Risk, Protect Against It
BSI's Mark Brown argues that Lloyd's decision to exclude systemic cyber risk from coverage offers an opportunity for organizations to become more resilient
#HowTo: Demand More from MSSPs
Richard Hollis suggests 10 questions organizations should ask their MSSPs
Mother’s Day Scams: Targeted Attacks on the Rise
Raj Dasgupta highlights scams for Americans to look out for while purchasing Mother's Day gifts
The Evolving Nature of Cybersecurity Careers: How to Stay Ahead of the Curve
EC Council's Jay Bavisi outlines how the opportunities and skillsets are evolving in cybersecurity
What Financial Executives Need to Know and Ask About Cybersecurity
Cameron Over highlights how cybersecurity can be demystified for CFOs
#HowTo: Mitigate Burnout for Cybersecurity Staff
Julien Soriano explains why minimizing burnout in cyber professionals is so crucial to organizations' security
A Decade On – What’s Happened to Crowdsourced Security?
Alex Haynes reflects the impact of crowdsourced security on the cyber industry so far
Mayday, Mayday our Network is Going Down
How cybersecurity can learn lessons from aviation’s response to serious incidents
The Real Threats and Opportunities of ChatGPT
There's been a lack of focus on the huge security benefits of ChatGPT, says Cequence's Jason Kent
Why European Space Cybersecurity Matters
We have an unprecedented opportunity to create a secure ecosystem to protect the critical space sector, says CYSAT's Mathieu Bailly
Pulling Back the Curtain to Address TikTok Security Concerns
People are key to the success of any cybersecurity plan around TikTok, says ThreatBlockr's Pat McGarry
HowTo: Protect Software by Understanding Your Environment
Software is a big target for cyber-criminals, and organizations must understand their environment to secure it
Data Security Best-Practice in a World of Evolving Risks and Regulations
Organizations with a uniform approach to data management and access control can increase their security and compliance
How Website Tracking Technologies Are Transforming Risk Analysis Across Industries
The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology
#HowTo: Reduce Risk and Complexity in Cloud Networks
John Moran discusses how security to move from inhibitor to enabler to organizations multi-cloud strategies
Why Security Pros Need to Escape the Cyber Bubble
The cybersecurity community agrees on so much, but why do we still argue over the same things?
The Anatomy of an Insider Threat
People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism