Infosecurity Opinions

  1. Learning from File Transfer Software Vendors’ Vulnerability Response

    Rapid7's Caitlin Condon explains why organizations could learn from file transfer vendors' response to high-severity vulnerabilities coming to light

    1. Photo of Caitlin Condon

      Caitlin Condon

      Director of Vulnerability Intelligence, Rapid7

  2. Rethinking Open-Source Intelligence for Security in Commercial Settings

    Jonathan Couch expects OSINT capabilities to be integrated into network security within the private sector in the next few years

    1. Photo of Jonathan Couch

      Jonathan Couch

      COO, ShadowDragon

  3. Four Steps to Cultivating a Cyber Resilient Workforce

    Businesses must address the cyber security training gap to combat rising attacks, this must be a joint effort through solutions, policies, and employee training is key

    1. Photo of Michael Armer

      Michael Armer

      CISO, RingCentral

  4. Resisting Hindsight Bias: A Proposed Framework for CISO Liability

    Debevoise & Plimpton proposes criteria for evaluating whether to charge CISOs for violations of federal security laws

    1. Photo of Luke Dembosky

      Luke Dembosky

      Partner and Co-Chair of Data Strategy & Security, Debevoise & Plimpton LLP

    2. Photo of Anna Moody

      Anna Moody

      Counsel, Debevoise & Plimpton LLP

    3. Photo of Julie M. Riewe

      Julie M. Riewe

      Partner, Debevoise & Plimpton LLP

  5. How to Bridge the Cyber Talent Gap

    Deloitte's Stephen Wray says the explosion of AI technology must be the catalyst for bridging the cyber skills gap

    1. Photo of Stephen Wray

      Stephen Wray

      Lead Cyber Partner for Government and Public Services, Deloitte UK

  6. Data Privacy Day: Data Privacy Enforcement Changes Impacting Businesses in 2024

    Legal experts detail changes to data privacy enforcement globally this year, and how this will impact businesses

    1. Photo of Robert Barton

      Robert Barton

      Associate, Freshfields

    2. Photo of Timothy Howard

      Timothy Howard

      Partner and US Head of Data Security, Freshfields

  7. Data Privacy Week: Can Businesses Navigate the PII Labyrinth in the Age of Cyber Threats?

    With stricter regulations and evolving threats, organizations must re-evaluate how they collect, store, and manage customer data

    1. Photo of Petra Tesch

      Petra Tesch

      Chief Information Officer, Vizrt

  8. Data Privacy Week: Navigating Data Privacy in the Age of AI

    Lawyers from Hanson Bridgett say there must be a commitment to responsible AI practices to navigate the changing data regulation landscape

    1. Photo of Jenny  Dao

      Jenny Dao

      Associate, Hanson Bridgett

    2. Photo of Batya Forsyth

      Batya Forsyth

      Partner, Hanson Bridgett

    3. Photo of Rob McFarlane

      Rob McFarlane

      Partner, Hanson Bridgett

  9. Data Privacy Week: Will the US Adopt a Federal Data Privacy Law in 2024?

    Vishal Gupta asks whether the US will take meaningful steps towards data privacy legislation this year

    1. Photo of Vishal Gupta

      Vishal Gupta

      CEO & Co-Founder, Seclore

  10. Data Privacy Week: AI Has Put Data Privacy Top of Mind

    Neil Thacker highlights how many data protection issues can be solved with AI

    1. Photo of Neil Thacker

      Neil Thacker

      EMEA and LATAM CISO, Netskope

  11. Election Security 2024: Biggest Cyber Threats and Practical Solutions

    With half the world voting in 2024, global tech giants warn of rising misinformation and disinformation threats to elections worldwide

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  12. Hackathons Are Far More Than a Big Tech Indulgence

    Manish Kamra says hackathons remain a vital method for learning and innovation in cybersecurity

    1. Photo of Manish Kamra

      Manish Kamra

      Group Vice President Engineering, N-able

What’s hot on Infosecurity Magazine?