Infosecurity Opinions

GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History
GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)
Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

Safeguarding Solar Energy Through Smarter Cybersecurity
Solar energy has been recognised by EU Institutions as critical infrastructure. This is what the industry must do to better protect itself from cyber threats.

Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
As AI accelerates the sophistication of attacks, the psychological side of cybersecurity is becoming ever more important.

Precision Becomes the New Playbook for Software Supply Chain Attacks
Adversaries are adopting a more precise approach to supply chain compromise. Organizations need to rethink what “secure software” really means.


Are Hacktivists Going Out of Business? Or Just Out of Style
Hacktivism has gone from grassroots activism to agenda-driven cyber campaigns. Should businesses still consider hacktivists a risk?

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Whether the catalyst is geopolitical friction, attacks on global shipping routes, or the unchecked growth of shadow AI, the common thread is exposure management

From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline
Learn how prioritizing forensic investigation lets organizations mitigate the operational, financial and reputational impact of attacks

From the Boardroom to the SOC: Why Some Organizations Recover Quickly from Ransomware While Others Stall
In many cases, the difference between rapid recovery and prolonged disruption can be traced back to decisions made long before an incident ever occurs

From Gatekeepers to Collaborators: The New Face of Information Security
John Eccleshare, Head of Information Security at bet365, explains how security has evolved from enforcing rules to fostering relationships

From The Few to the Many: How ‘PAM For All’ Strengthens Security
With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators

Hired to Hack: Protecting Your Business from Remote Recruitment Scams
Remote hiring brings global talent and hidden risks. Learn how fake identities and covert operatives infiltrate companies, and what HR and security teams can do to prevent financial and legal fallout

Hacker-Tested, Security-Leader Approved: Five Steps to Stop Modern Fraud
Five steps every organization should take to protect its people, processes and payments from the modern era of impersonation and fraud

Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership
CISOs face unprecedented and unbearable pressures in the UK, but hope is not lost, as Ben Nelson, CISO at global analytics software leader FICO explains

Why ‘AI-Powered’ Cyber-Attacks Are Not a Serious Threat …Yet
AI is reshaping cybersecurity, but its offensive power is often overstated. Learn why security teams should focus on real, proven threats

Our Industries Are Vulnerable to Cyber-Attacks: Boardrooms Must Prioritize Resilience, Not Reaction
AI-powered cyberattacks are escalating, leaving UK businesses vulnerable. With 88% lacking maturity to defend against threats, industries like finance, retail, and infrastructure face rising risks. Discover why resilience is critical in the age of AI-driven cybercrime

Regulating AI: Where Should the Line Be Drawn?
John Eccleshare, Head of Information Security at bet365, explores why regulating AI’s use (not its development), is key to ensuring both progress and protection.

I Negotiated Ransomware Incidents Across 15 Countries: Three Things You Must Know
CISO Ensar Seker shares key lessons from negotiating 40+ ransomware cases across 15 countries and what every leader must know before a cyber crisis

How the Tech Industry Got Identity Wrong
Teleport CEO Ev Kontsevoy explains why identity management is broken and why it takes 11 hours to resolve a single breach
























