Infosecurity Opinions

  1. Why Organizations Need to Adapt Their Defenses to Protect Against the Rise of Phishing-as-a-Service

    Democratization of cybercrime is driving PhaaS expansion. Here's what you need to know to protect your network

    1. Photo of Saravanan Mohankumar

      Saravanan Mohankumar

      Manager, Software Engineering and Security Analysis Team, Barracuda Networks

  2. Agentic AI’s Problem Isn’t Capability It’s Accountability

    Agentic AI sees organizations moving from managing system risk to managing decision risk, and that is a far more complex challenge

    1. Photo of John  Eccleshare

      John Eccleshare

      CISO, bet365

  3. AI Is Getting Smarter. Is Your Supply Chain Keeping Up?

    Coding errors or data poisoning can create security challenges in the AI supply chain. Here's how to prevent that from happening

    1. Photo of Anoop Nadig

      Anoop Nadig

      Senior Security Engineer, Microsoft

    2. Photo of Snahil Singh

      Snahil Singh

      Senior Security Engineer, Apple

  4. The Rising Risk Landscape for Critical National Infrastructure

    Cyber resilience in critical infrastructure is essential to critical services running. A stronger mindset is needed to protect against attacks

    1. Photo of Louise Bulman

      Louise Bulman

      Vice President International, Dragos

  5. OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

    As recent incidents have showed, without effective governance, visibility and control, risks around Agentic AI can escalate rapidly

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  6. Passwords are the Weakest Link in a Phishing-First World

    As traditional network perimeters continue to disappear, modern SaaS environments, remote work, and expanding third-party access have shifted cyber risk away from networks and toward how trust is established and enforced.

    1. Photo of Jan Bee

      Jan Bee

      CISO, TeamViewer

  7. When Agentic AI Becomes Your Riskiest Third Party

    Agentic AI is not just another tool. It is a new type of third-party vendor with autonomy and privileges that require oversight

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  8. When the World Splits: Are Businesses Really Ready?

    Geopolitical rifts are becoming more frequent, more complex and more interconnected. Businesses cannot control global politics, but they can control their preparedness

    1. Photo of Megha  Kumar

      Megha Kumar

      Chief Product Officer and Head of Geopolitical Risk, CyXcel

  9. The UK Cyber Security and Resilience Bill: What OT Asset Owners Need to Know Now

    While the bill’s fine points may still evolve, its overall direction is clear. OT operators should act now.

    1. Photo of Tom Westenberg

      Tom Westenberg

      Senior Technical Sales Engineer, Nozomi Networks

  10. Clawing Back on Security: Challenges with Agentic AI Systems

    Agentic AI Ecosystems are Rewriting the Rules of Traditional Cybersecurity Issues

    1. Photo of Donavan Cheah

      Donavan Cheah

      Emerging Trends Working Group Member, ISACA

  11. IT and OT Are Not Equal. IT Can Fail. Your OT Cannot

    It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

    1. Photo of Aaron Singleton-Martin

      Aaron Singleton-Martin

      UK Channel Manager, Secolve

  12. Strengthening Supply Chain Cyber Resilience: A Leadership Imperative

    In an increasingly interconnected business environment, third-party resilience is no longer optional.

    1. Photo of Lorri Janssen-Anessi

      Lorri Janssen-Anessi

      Director of External Cyber Assessments, BlueVoyant

  13. Strategic Leadership in Digital Transformation

    Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  14. The Path of Least Resistance: Why Active Inertia is the Real AI Threat

    Cyber teams must stop looking at environments as a list of compliance requirements. Stop checking boxes and start measuring resistance to AI threats

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  15. Decentralized Cybersecurity: Why the EU Vulnerability Database Is a Blueprint For the Future

    In a world where attackers innovate without central permission, defenders must learn to do the same

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  16. Digital Psychological Warfare: How the Weaponization of Digital Platforms Threatens Minds, Markets, and Modern Institutions

    Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what cybersecurity leaders need to know.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  17. AI Raises the Cybersecurity Stakes, But People Still Open the Door

    John Eccleshare, Head of Information Security at bet365, explores why the real cybersecurity battle in the age of AI remains human vs. human

    1. Photo of John  Eccleshare

      John Eccleshare

      CISO, bet365

  18. From Cyber-Attack to Burglary: The Surprising Impact of the French Shooting Federation Breach

    The impact of data breaches isn't just felt in cyberspace. Criminals use leaks to facilitate physical crimes too

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  19. GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History

    GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

    1. Photo of Ray Canzanese

      Ray Canzanese

      Director, Netskope Threat Labs

  20. Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)

    Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

    1. Photo of Moona Ederveen-Schneider

      Moona Ederveen-Schneider

      Principal Consultant, Information Security Forum

What’s Hot on Infosecurity Magazine?