Infosecurity Opinions

IT and OT Are Not Equal. IT Can Fail. Your OT Cannot
It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

Strengthening Supply Chain Cyber Resilience: A Leadership Imperative
In an increasingly interconnected business environment, third-party resilience is no longer optional.

Strategic Leadership in Digital Transformation
Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.

The Path of Least Resistance: Why Active Inertia is the Real AI Threat
Cyber teams must stop looking at environments as a list of compliance requirements. Stop checking boxes and start measuring resistance to AI threats

Decentralized Cybersecurity: Why the EU Vulnerability Database Is a Blueprint For the Future
In a world where attackers innovate without central permission, defenders must learn to do the same

Digital Psychological Warfare: How the Weaponization of Digital Platforms Threatens Minds, Markets, and Modern Institutions
Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what cybersecurity leaders need to know.

AI Raises the Cybersecurity Stakes, But People Still Open the Door
John Eccleshare, Head of Information Security at bet365, explores why the real cybersecurity battle in the age of AI remains human vs. human

From Cyber-Attack to Burglary: The Surprising Impact of the French Shooting Federation Breach
The impact of data breaches isn't just felt in cyberspace. Criminals use leaks to facilitate physical crimes too

GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History
GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)
Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

Safeguarding Solar Energy Through Smarter Cybersecurity
Solar energy has been recognised by EU Institutions as critical infrastructure. This is what the industry must do to better protect itself from cyber threats.

Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
As AI accelerates the sophistication of attacks, the psychological side of cybersecurity is becoming ever more important.

Precision Becomes the New Playbook for Software Supply Chain Attacks
Adversaries are adopting a more precise approach to supply chain compromise. Organizations need to rethink what “secure software” really means.


Are Hacktivists Going Out of Business? Or Just Out of Style
Hacktivism has gone from grassroots activism to agenda-driven cyber campaigns. Should businesses still consider hacktivists a risk?

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Whether the catalyst is geopolitical friction, attacks on global shipping routes, or the unchecked growth of shadow AI, the common thread is exposure management

From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline
Learn how prioritizing forensic investigation lets organizations mitigate the operational, financial and reputational impact of attacks

From the Boardroom to the SOC: Why Some Organizations Recover Quickly from Ransomware While Others Stall
In many cases, the difference between rapid recovery and prolonged disruption can be traced back to decisions made long before an incident ever occurs

From Gatekeepers to Collaborators: The New Face of Information Security
John Eccleshare, Head of Information Security at bet365, explains how security has evolved from enforcing rules to fostering relationships

From The Few to the Many: How ‘PAM For All’ Strengthens Security
With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators





















