Infosecurity Opinions

  1. Math, Morals, and the Machine: Perspectives on AI Security and Ethics

    The task ahead is not to give machines a conscience. It is to design systems where failures are predictable, constrained, and survivable

    1. Photo of Hrishitva Patel

      Hrishitva Patel

      PhD candidate in Information Systems, University of Texas

  2. AI Agents Are Here. Security Must Be an Accelerator for AI Transformation

    As agents are being deployed, security and risk leaders need to identify and resolve blind spots before they outpace controls

    1. Photo of Herain Oberoi

      Herain Oberoi

      Vice President, Data and AI Security, Microsoft

  3. AI Didn't Break Identity Security. It Exposed What Was Already Broken

    AI is changing the identity threat model faster than most organizations are adapting - and cyberattacks are exploiting it

    1. Photo of Guy Kozliner

      Guy Kozliner

      CEO & Co-founder, Rig Security

  4. The First 24 Hours: What I Learned Responding to a Real-World Ransomware Attack

    CISO Zach Lewis details what happened when ransomware hit his organization - and how they responded the attack

    1. Photo of Zach Lewis

      Zach Lewis

      CISO, University of Health Sciences and Pharmacy in St. Louis

  5. How Crowdsourced Security is Transforming the Public Sector Cybersecurity Landscape

    With rising cyber risk, public sector organizations are embracing crowdsourced security and CTEM to strengthen defenses beyond periodic testing

    1. Photo of Laurie Mercer

      Laurie Mercer

      Senior Director of Solutions Engineering, HackerOne

  6. Five Years Later: Lessons Learned From Colonial Pipeline Ransomware Attack

    In May 2021, a coordinated government response helped contain the ransomware attack that disrupted America’s gas supply. Are we ready for the next major attack against critical infrastructure?

    1. Photo of Dr. Joye Purser

      Dr. Joye Purser

      Global Field CISO, Cohesity

  7. AI Accelerated Cyber-Attacks Aren’t New, But They Are Faster

    The fundamentals of compromise have not changed, but with AI, the pace of exploitation has

    1. Photo of Chris Atkinson

      Chris Atkinson

      Digital Trust and Cyber Security Expert, PA Consulting

  8. Why Organizations Need to Adapt Their Defenses to Protect Against the Rise of Phishing-as-a-Service

    Democratization of cybercrime is driving PhaaS expansion. Here's what you need to know to protect your network

    1. Photo of Saravanan Mohankumar

      Saravanan Mohankumar

      Manager, Software Engineering and Security Analysis Team, Barracuda Networks

  9. Agentic AI’s Problem Isn’t Capability It’s Accountability

    Agentic AI sees organizations moving from managing system risk to managing decision risk, and that is a far more complex challenge

    1. Photo of John  Eccleshare

      John Eccleshare

      CISO, bet365

  10. AI Is Getting Smarter. Is Your Supply Chain Keeping Up?

    Coding errors or data poisoning can create security challenges in the AI supply chain. Here's how to prevent that from happening

    1. Photo of Anoop Nadig

      Anoop Nadig

      Senior Security Engineer, Microsoft

    2. Photo of Snahil Singh

      Snahil Singh

      Senior Security Engineer, Apple

  11. The Rising Risk Landscape for Critical National Infrastructure

    Cyber resilience in critical infrastructure is essential to critical services running. A stronger mindset is needed to protect against attacks

    1. Photo of Louise Bulman

      Louise Bulman

      Vice President International, Dragos

  12. OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

    As recent incidents have showed, without effective governance, visibility and control, risks around Agentic AI can escalate rapidly

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  13. Passwords are the Weakest Link in a Phishing-First World

    As traditional network perimeters continue to disappear, modern SaaS environments, remote work, and expanding third-party access have shifted cyber risk away from networks and toward how trust is established and enforced.

    1. Photo of Jan Bee

      Jan Bee

      CISO, TeamViewer

  14. When Agentic AI Becomes Your Riskiest Third Party

    Agentic AI is not just another tool. It is a new type of third-party vendor with autonomy and privileges that require oversight

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  15. When the World Splits: Are Businesses Really Ready?

    Geopolitical rifts are becoming more frequent, more complex and more interconnected. Businesses cannot control global politics, but they can control their preparedness

    1. Photo of Megha  Kumar

      Megha Kumar

      Chief Product Officer and Head of Geopolitical Risk, CyXcel

  16. The UK Cyber Security and Resilience Bill: What OT Asset Owners Need to Know Now

    While the bill’s fine points may still evolve, its overall direction is clear. OT operators should act now.

    1. Photo of Tom Westenberg

      Tom Westenberg

      Senior Technical Sales Engineer, Nozomi Networks

  17. Clawing Back on Security: Challenges with Agentic AI Systems

    Agentic AI Ecosystems are Rewriting the Rules of Traditional Cybersecurity Issues

    1. Photo of Donavan Cheah

      Donavan Cheah

      Emerging Trends Working Group Member, ISACA

  18. IT and OT Are Not Equal. IT Can Fail. Your OT Cannot

    It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

    1. Photo of Aaron Singleton-Martin

      Aaron Singleton-Martin

      UK Channel Manager, Secolve

  19. Strengthening Supply Chain Cyber Resilience: A Leadership Imperative

    In an increasingly interconnected business environment, third-party resilience is no longer optional.

    1. Photo of Lorri Janssen-Anessi

      Lorri Janssen-Anessi

      Director of External Cyber Assessments, BlueVoyant

  20. Strategic Leadership in Digital Transformation

    Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

What’s Hot on Infosecurity Magazine?