Infosecurity Opinions


Are Hacktivists Going Out of Business? Or Just Out of Style
Hacktivism has gone from grassroots activism to agenda-driven cyber campaigns. Should businesses still consider hacktivists a risk?

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Whether the catalyst is geopolitical friction, attacks on global shipping routes, or the unchecked growth of shadow AI, the common thread is exposure management

From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline
Learn how prioritizing forensic investigation lets organizations mitigate the operational, financial and reputational impact of attacks

From the Boardroom to the SOC: Why Some Organizations Recover Quickly from Ransomware While Others Stall
In many cases, the difference between rapid recovery and prolonged disruption can be traced back to decisions made long before an incident ever occurs

From Gatekeepers to Collaborators: The New Face of Information Security
John Eccleshare, Head of Information Security at bet365, explains how security has evolved from enforcing rules to fostering relationships

From The Few to the Many: How ‘PAM For All’ Strengthens Security
With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators

Hired to Hack: Protecting Your Business from Remote Recruitment Scams
Remote hiring brings global talent and hidden risks. Learn how fake identities and covert operatives infiltrate companies, and what HR and security teams can do to prevent financial and legal fallout

Hacker-Tested, Security-Leader Approved: Five Steps to Stop Modern Fraud
Five steps every organization should take to protect its people, processes and payments from the modern era of impersonation and fraud

Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership
CISOs face unprecedented and unbearable pressures in the UK, but hope is not lost, as Ben Nelson, CISO at global analytics software leader FICO explains

Why ‘AI-Powered’ Cyber-Attacks Are Not a Serious Threat …Yet
AI is reshaping cybersecurity, but its offensive power is often overstated. Learn why security teams should focus on real, proven threats

Our Industries Are Vulnerable to Cyber-Attacks: Boardrooms Must Prioritize Resilience, Not Reaction
AI-powered cyberattacks are escalating, leaving UK businesses vulnerable. With 88% lacking maturity to defend against threats, industries like finance, retail, and infrastructure face rising risks. Discover why resilience is critical in the age of AI-driven cybercrime

Regulating AI: Where Should the Line Be Drawn?
John Eccleshare, Head of Information Security at bet365, explores why regulating AI’s use (not its development), is key to ensuring both progress and protection.

I Negotiated Ransomware Incidents Across 15 Countries: Three Things You Must Know
CISO Ensar Seker shares key lessons from negotiating 40+ ransomware cases across 15 countries and what every leader must know before a cyber crisis

How the Tech Industry Got Identity Wrong
Teleport CEO Ev Kontsevoy explains why identity management is broken and why it takes 11 hours to resolve a single breach

The Hidden Risks of Third-Party IoT Devices: What Organizations Need to Know
Snahil Singh and Anoop Nadig say security teams must prioritize tackling the growing risks of third-party IoT devices

How to Keep Ourselves Safe from AI as it Evolves
Professor Gaven Smith says human centered interventions are required to mitigate AI risks such as bias, surveillance and misinformation

Escaping the Detection Trap: Is EDR Giving You a False Sense of Security?
Traditional EDR tools are falling short as modern threats evolve. This article explores how fast-moving adversaries are exploiting defender tools, creating a false sense of security and overwhelming security teams

The CISO's Crucible – Finding Strength in Control
Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles

Private Sector Must Shore up UK’s Cyber Defense
SCC's Chris McGrath argues that siloed UK government structures requires a coordinated private sector-enabled solution to protect businesses and critical services
























