Infosecurity Opinions

  1. OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

    As recent incidents have showed, without effective governance, visibility and control, risks around Agentic AI can escalate rapidly

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  2. Passwords are the Weakest Link in a Phishing-First World

    As traditional network perimeters continue to disappear, modern SaaS environments, remote work, and expanding third-party access have shifted cyber risk away from networks and toward how trust is established and enforced.

    1. Photo of Jan Bee

      Jan Bee

      CISO, TeamViewer

  3. When Agentic AI Becomes Your Riskiest Third Party

    Agentic AI is not just another tool. It is a new type of third-party vendor with autonomy and privileges that require oversight

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  4. When the World Splits: Are Businesses Really Ready?

    Geopolitical rifts are becoming more frequent, more complex and more interconnected. Businesses cannot control global politics, but they can control their preparedness

    1. Photo of Megha  Kumar

      Megha Kumar

      Chief Product Officer and Head of Geopolitical Risk, CyXcel

  5. The UK Cyber Security and Resilience Bill: What OT Asset Owners Need to Know Now

    While the bill’s fine points may still evolve, its overall direction is clear. OT operators should act now.

    1. Photo of Tom Westenberg

      Tom Westenberg

      Senior Technical Sales Engineer, Nozomi Networks

  6. Clawing Back on Security: Challenges with Agentic AI Systems

    Agentic AI Ecosystems are Rewriting the Rules of Traditional Cybersecurity Issues

    1. Photo of Donavan Cheah

      Donavan Cheah

      Emerging Trends Working Group Member, ISACA

  7. IT and OT Are Not Equal. IT Can Fail. Your OT Cannot

    It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

    1. Photo of Aaron Singleton-Martin

      Aaron Singleton-Martin

      UK Channel Manager, Secolve

  8. Strengthening Supply Chain Cyber Resilience: A Leadership Imperative

    In an increasingly interconnected business environment, third-party resilience is no longer optional.

    1. Photo of Lorri Janssen-Anessi

      Lorri Janssen-Anessi

      Director of External Cyber Assessments, BlueVoyant

  9. Strategic Leadership in Digital Transformation

    Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  10. The Path of Least Resistance: Why Active Inertia is the Real AI Threat

    Cyber teams must stop looking at environments as a list of compliance requirements. Stop checking boxes and start measuring resistance to AI threats

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  11. Decentralized Cybersecurity: Why the EU Vulnerability Database Is a Blueprint For the Future

    In a world where attackers innovate without central permission, defenders must learn to do the same

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  12. Digital Psychological Warfare: How the Weaponization of Digital Platforms Threatens Minds, Markets, and Modern Institutions

    Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what cybersecurity leaders need to know.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

  13. AI Raises the Cybersecurity Stakes, But People Still Open the Door

    John Eccleshare, Head of Information Security at bet365, explores why the real cybersecurity battle in the age of AI remains human vs. human

    1. Photo of John  Eccleshare

      John Eccleshare

      CISO, bet365

  14. From Cyber-Attack to Burglary: The Surprising Impact of the French Shooting Federation Breach

    The impact of data breaches isn't just felt in cyberspace. Criminals use leaks to facilitate physical crimes too

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  15. GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History

    GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

    1. Photo of Ray Canzanese

      Ray Canzanese

      Director, Netskope Threat Labs

  16. Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)

    Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

    1. Photo of Moona Ederveen-Schneider

      Moona Ederveen-Schneider

      Principal Consultant, Information Security Forum

  17. Safeguarding Solar Energy Through Smarter Cybersecurity

    Solar energy has been recognised by EU Institutions as critical infrastructure. This is what the industry must do to better protect itself from cyber threats.

    1. Photo of Christelle Barnes

      Christelle Barnes

      General Manager, SolarEdge UK

  18. Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence

    As AI accelerates the sophistication of attacks, the psychological side of cybersecurity is becoming ever more important.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

    2. Photo of Sarah Zheng

      Sarah Zheng

      Senior Fellow, University College London

  19. Precision Becomes the New Playbook for Software Supply Chain Attacks

    Adversaries are adopting a more precise approach to supply chain compromise. Organizations need to rethink what “secure software” really means.

    1. Photo of Keith McCammon

      Keith McCammon

      Chief Security Officer & Co-Founder, Red Canary

  20. Turning the OWASP Agentic Top 10 into Operational AI Security

    1. Photo of Kayla Underkoffler

      Kayla Underkoffler

      Director of AI Security and Policy Advocacy, Zenity

What’s Hot on Infosecurity Magazine?