Infosecurity Opinions

Math, Morals, and the Machine: Perspectives on AI Security and Ethics
The task ahead is not to give machines a conscience. It is to design systems where failures are predictable, constrained, and survivable

AI Agents Are Here. Security Must Be an Accelerator for AI Transformation
As agents are being deployed, security and risk leaders need to identify and resolve blind spots before they outpace controls

AI Didn't Break Identity Security. It Exposed What Was Already Broken
AI is changing the identity threat model faster than most organizations are adapting - and cyberattacks are exploiting it

The First 24 Hours: What I Learned Responding to a Real-World Ransomware Attack
CISO Zach Lewis details what happened when ransomware hit his organization - and how they responded the attack

How Crowdsourced Security is Transforming the Public Sector Cybersecurity Landscape
With rising cyber risk, public sector organizations are embracing crowdsourced security and CTEM to strengthen defenses beyond periodic testing

Five Years Later: Lessons Learned From Colonial Pipeline Ransomware Attack
In May 2021, a coordinated government response helped contain the ransomware attack that disrupted America’s gas supply. Are we ready for the next major attack against critical infrastructure?

AI Accelerated Cyber-Attacks Aren’t New, But They Are Faster
The fundamentals of compromise have not changed, but with AI, the pace of exploitation has

Why Organizations Need to Adapt Their Defenses to Protect Against the Rise of Phishing-as-a-Service
Democratization of cybercrime is driving PhaaS expansion. Here's what you need to know to protect your network

Agentic AI’s Problem Isn’t Capability It’s Accountability
Agentic AI sees organizations moving from managing system risk to managing decision risk, and that is a far more complex challenge

AI Is Getting Smarter. Is Your Supply Chain Keeping Up?
Coding errors or data poisoning can create security challenges in the AI supply chain. Here's how to prevent that from happening

The Rising Risk Landscape for Critical National Infrastructure
Cyber resilience in critical infrastructure is essential to critical services running. A stronger mindset is needed to protect against attacks

OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI
As recent incidents have showed, without effective governance, visibility and control, risks around Agentic AI can escalate rapidly

Passwords are the Weakest Link in a Phishing-First World
As traditional network perimeters continue to disappear, modern SaaS environments, remote work, and expanding third-party access have shifted cyber risk away from networks and toward how trust is established and enforced.

When Agentic AI Becomes Your Riskiest Third Party
Agentic AI is not just another tool. It is a new type of third-party vendor with autonomy and privileges that require oversight

When the World Splits: Are Businesses Really Ready?
Geopolitical rifts are becoming more frequent, more complex and more interconnected. Businesses cannot control global politics, but they can control their preparedness

The UK Cyber Security and Resilience Bill: What OT Asset Owners Need to Know Now
While the bill’s fine points may still evolve, its overall direction is clear. OT operators should act now.

Clawing Back on Security: Challenges with Agentic AI Systems
Agentic AI Ecosystems are Rewriting the Rules of Traditional Cybersecurity Issues

IT and OT Are Not Equal. IT Can Fail. Your OT Cannot
It’s high time that OT cybersecurity got the attention and investment it deserves, writes Secolve's Aaron Singleton-Martin

Strengthening Supply Chain Cyber Resilience: A Leadership Imperative
In an increasingly interconnected business environment, third-party resilience is no longer optional.

Strategic Leadership in Digital Transformation
Executives who treat transformation as a technology upgrade often see limited returns. Those who treat it as a strategic reinvention unlock new business models, security by design and adaptive operating models.























