Infosecurity Opinions

It’s Time to Elevate the Humble SBOM
Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative

Navigating the Future with Generative AI: Treating AI as a Trusted Colleague
Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool

Paving a Path to Security by Design Across the Industry
SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals

How to Securely Manage the Data of Vulnerable Groups
Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups

Why it’s Time to Kick the Password Habit
The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption

How to Ensure Cyber Resilience Across the Supply Chain
Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?
Mike Britton argues that the new strategy is welcome, but could go further

The Impact of Artificial Intelligence on Software Development
Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

HowTo: Challenge Deepfake Fraud
Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

Mythbusting Through the AI Noise in Cyber: What You Need to Know
Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

State of the Nation: Exploring the UK Cyber Landscape
Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

How to Create a Culture of Incident Reporting
Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect
Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance
The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

Four Cybersecurity Roles for CFOs
Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

How to Tackle Deepfakes and Manipulation
Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes

Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises
Igor Volovich says its time for a paradigm shift in compliance strategies

Pandemic Development Risks Non-Compliance with White House Guidelines
Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy

How To Prevent Ransomware Attackers Striking Again
Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

Reviewing the UK Government Call for Views on Supply Chain Threats
Michael Smith says that open dialogue is the first step to improving supply chain security






















