Infosecurity Opinions

  1. GenAI Has Become the Biggest Data-Exposure Risk in Enterprise History

    GenAI adoption is outpacing enterprise security. Here's what organizations must do to close the widening gap

    1. Photo of Ray Canzanese

      Ray Canzanese

      Director, Netskope Threat Labs

  2. Why Your Organization Should Start Quantum Preparedness Today (Even If Quantum Computers Are Years Away)

    Quantum preparedness manageable, using skills and resources security teams already have and embedding the activities in ongoing security remediation work

    1. Photo of Moona Ederveen-Schneider

      Moona Ederveen-Schneider

      Principal Consultant, Information Security Forum

  3. Safeguarding Solar Energy Through Smarter Cybersecurity

    Solar energy has been recognised by EU Institutions as critical infrastructure. This is what the industry must do to better protect itself from cyber threats.

    1. Photo of Christelle Barnes

      Christelle Barnes

      General Manager, SolarEdge UK

  4. Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence

    As AI accelerates the sophistication of attacks, the psychological side of cybersecurity is becoming ever more important.

    1. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, Cyber Wisdom Ltd

    2. Photo of Sarah Zheng

      Sarah Zheng

      Senior Fellow, University College London

  5. Precision Becomes the New Playbook for Software Supply Chain Attacks

    Adversaries are adopting a more precise approach to supply chain compromise. Organizations need to rethink what “secure software” really means.

    1. Photo of Keith McCammon

      Keith McCammon

      Chief Security Officer & Co-Founder, Red Canary

  6. Turning the OWASP Agentic Top 10 into Operational AI Security

    1. Photo of Kayla Underkoffler

      Kayla Underkoffler

      Director of AI Security and Policy Advocacy, Zenity

  7. Are Hacktivists Going Out of Business? Or Just Out of Style

    Hacktivism has gone from grassroots activism to agenda-driven cyber campaigns. Should businesses still consider hacktivists a risk?

    1. Photo of Josh Taylor

      Josh Taylor

      Lead Cybersecurity Analyst, Fortra

  8. Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience

    Whether the catalyst is geopolitical friction, attacks on global shipping routes, or the unchecked growth of shadow AI, the common thread is exposure management

    1. Photo of Yuval Wollman

      Yuval Wollman

      President, CyberProof

  9. From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline

    Learn how prioritizing forensic investigation lets organizations mitigate the operational, financial and reputational impact of attacks

    1. Photo of Lee Sult

      Lee Sult

      Chief Investigator, Binalyze

  10. From the Boardroom to the SOC: Why Some Organizations Recover Quickly from Ransomware While Others Stall

    In many cases, the difference between rapid recovery and prolonged disruption can be traced back to decisions made long before an incident ever occurs

    1. Photo of Oliver Newbury

      Oliver Newbury

      Chief Strategy Officer, Halcyon

  11. From Gatekeepers to Collaborators: The New Face of Information Security

    John Eccleshare, Head of Information Security at bet365, explains how security has evolved from enforcing rules to fostering relationships

    1. Photo of John  Eccleshare

      John Eccleshare

      Head of Information Security, bet365

  12. From The Few to the Many: How ‘PAM For All’ Strengthens Security

    With major cyber-attacks accelerating and identity-based threats becoming the norm, the defensive mindset can no longer focus on a narrow group of administrators

    1. Photo of Darren Guccione

      Darren Guccione

      CEO & Co-Founder, Keeper Security

  13. Hired to Hack: Protecting Your Business from Remote Recruitment Scams

    Remote hiring brings global talent and hidden risks. Learn how fake identities and covert operatives infiltrate companies, and what HR and security teams can do to prevent financial and legal fallout

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  14. Hacker-Tested, Security-Leader Approved: Five Steps to Stop Modern Fraud

    Five steps every organization should take to protect its people, processes and payments from the modern era of impersonation and fraud

    1. Photo of Shai  Gabay

      Shai Gabay

      Co-founder & CEO, Trustmi

    2. Photo of Rachel  Tobac

      Rachel Tobac

      Ethical Hacker & CEO of SocialProof Security

  15. Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership

    CISOs face unprecedented and unbearable pressures in the UK, but hope is not lost, as Ben Nelson, CISO at global analytics software leader FICO explains

    1. Photo of Ben  Nelson

      Ben Nelson

      CISO, FICO

  16. Why ‘AI-Powered’ Cyber-Attacks Are Not a Serious Threat …Yet

    AI is reshaping cybersecurity, but its offensive power is often overstated. Learn why security teams should focus on real, proven threats

    1. Photo of David Sancho

      David Sancho

      Senior Threat Researcher, Trend Micro

  17. Our Industries Are Vulnerable to Cyber-Attacks: Boardrooms Must Prioritize Resilience, Not Reaction

    AI-powered cyberattacks are escalating, leaving UK businesses vulnerable. With 88% lacking maturity to defend against threats, industries like finance, retail, and infrastructure face rising risks. Discover why resilience is critical in the age of AI-driven cybercrime

    1. Photo of Kamran Ikram

      Kamran Ikram

      Cybersecurity Lead, UK, Ireland and Africa, Accenture

  18. Regulating AI: Where Should the Line Be Drawn?

    John Eccleshare, Head of Information Security at bet365, explores why regulating AI’s use (not its development), is key to ensuring both progress and protection.

    1. Photo of John  Eccleshare

      John Eccleshare

      Head of Information Security, bet365

  19. I Negotiated Ransomware Incidents Across 15 Countries: Three Things You Must Know

    CISO Ensar Seker shares key lessons from negotiating 40+ ransomware cases across 15 countries and what every leader must know before a cyber crisis

    1. Photo of Ensar  Seker

      Ensar Seker

      CISO, SOCRadar

  20. How the Tech Industry Got Identity Wrong

    Teleport CEO Ev Kontsevoy explains why identity management is broken and why it takes 11 hours to resolve a single breach

    1. Photo of Ev Kontsevoy

      Ev Kontsevoy

      CEO and Co-Founder, Teleport

What’s Hot on Infosecurity Magazine?