Infosecurity Opinions

  1. IT and OT Are Not Equal. IT Can Fail. Your OT Cannot

    It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

    1. Photo of Aaron Singleton-Martin

      Aaron Singleton-Martin

      UK Channel Manager, Secolve

  2. Strengthening Supply Chain Cyber Resilience: A Leadership Imperative

    In an increasingly interconnected business environment, third-party resilience is no longer optional.

    1. Photo of Lorri Janssen-Anessi

      Lorri Janssen-Anessi

      Director of External Cyber Assessments, BlueVoyant

  3. Strategic Leadership in Digital Transformation

    Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  4. The Path of Least Resistance: Why Active Inertia is the Real AI Threat

    Cyber teams must stop looking at environments as a list of compliance requirements. Stop checking boxes and start measuring resistance to AI threats

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  5. Decentralized Cybersecurity: Why the EU Vulnerability Database Is a Blueprint For the Future

    In a world where attackers innovate without central permission, defenders must learn to do the same

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  6. Digital Psychological Warfare: How the Weaponization of Digital Platforms Threatens Minds, Markets, and Modern Institutions

    Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what cybersecurity leaders need to know.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  7. AI Raises the Cybersecurity Stakes, But People Still Open the Door

    John Eccleshare, Head of Information Security at bet365, explores why the real cybersecurity battle in the age of AI remains human vs. human

    1. Photo of John  Eccleshare

      John Eccleshare

      Head of Information Security, bet365

  8. From Cyber-Attack to Burglary: The Surprising Impact of the French Shooting Federation Breach

    The impact of data breaches isn't just felt in cyberspace. Criminals use leaks to facilitate physical crimes too

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  9. GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History

    GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

    1. Photo of Ray Canzanese

      Ray Canzanese

      Director, Netskope Threat Labs

  10. Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)

    Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

    1. Photo of Moona Ederveen-Schneider

      Moona Ederveen-Schneider

      Principal Consultant, Information Security Forum

  11. Safeguarding Solar Energy Through Smarter Cybersecurity

    Solar energy has been recognised by EU Institutions as critical infrastructure. This is what the industry must do to better protect itself from cyber threats.

    1. Photo of Christelle Barnes

      Christelle Barnes

      General Manager, SolarEdge UK

  12. Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence

    As AI accelerates the sophistication of attacks, the psychological side of cybersecurity is becoming ever more important.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

    2. Photo of Sarah Zheng

      Sarah Zheng

      Senior Fellow, University College London

  13. Precision Becomes the New Playbook for Software Supply Chain Attacks

    Adversaries are adopting a more precise approach to supply chain compromise. Organizations need to rethink what “secure software” really means.

    1. Photo of Keith McCammon

      Keith McCammon

      Chief Security Officer & Co-Founder, Red Canary

  14. Turning the OWASP Agentic Top 10 into Operational AI Security

    1. Photo of Kayla Underkoffler

      Kayla Underkoffler

      Director of AI Security and Policy Advocacy, Zenity

  15. Are Hacktivists Going Out of Business? Or Just Out of Style

    Hacktivism has gone from grassroots activism to agenda-driven cyber campaigns. Should businesses still consider hacktivists a risk?

    1. Photo of Josh Taylor

      Josh Taylor

      Lead Cybersecurity Analyst, Fortra

  16. Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience

    Whether the catalyst is geopolitical friction, attacks on global shipping routes, or the unchecked growth of shadow AI, the common thread is exposure management

    1. Photo of Yuval Wollman

      Yuval Wollman

      President, CyberProof

  17. From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline

    Learn how prioritizing forensic investigation lets organizations mitigate the operational, financial and reputational impact of attacks

    1. Photo of Lee Sult

      Lee Sult

      Chief Investigator, Binalyze

  18. From the Boardroom to the SOC: Why Some Organizations Recover Quickly from Ransomware While Others Stall

    In many cases, the difference between rapid recovery and prolonged disruption can be traced back to decisions made long before an incident ever occurs

    1. Photo of Oliver Newbury

      Oliver Newbury

      Chief Strategy Officer, Halcyon

  19. From Gatekeepers to Collaborators: The New Face of Information Security

    John Eccleshare, Head of Information Security at bet365, explains how security has evolved from enforcing rules to fostering relationships

    1. Photo of John  Eccleshare

      John Eccleshare

      Head of Information Security, bet365

  20. From The Few to the Many: How ‘PAM For All’ Strengthens Security

    With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators

    1. Photo of Darren Guccione

      Darren Guccione

      CEO & Co-Founder, Keeper Security

What’s Hot on Infosecurity Magazine?