Infosecurity Opinions

  1. A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance

    The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  2. Four Cybersecurity Roles for CFOs

    Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  3. How to Tackle Deepfakes and Manipulation

    Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  4. Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises

    Igor Volovich says its time for a paradigm shift in compliance strategies

    1. Photo of Igor Volovich

      Igor Volovich

      VP of Compliance Strategy, Qmulos

  5. Pandemic Development Risks Non-Compliance with White House Guidelines

    Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy

    1. Photo of Meredith Bell

      Meredith Bell

      CEO, AutoRABIT

  6. How To Prevent Ransomware Attackers Striking Again

    Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

    1. Photo of Charles Smith

      Charles Smith

      Consulting Solutions Engineer, Data Protection, Barracuda

  7. Reviewing the UK Government Call for Views on Supply Chain Threats

    Michael Smith says that open dialogue is the first step to improving supply chain security

    1. Photo of Michael Smith

      Michael Smith

      Field CTO, Vercara

  8. Generative AI: Friend or Foe?

    Joe Partlow assesses the security threats and benefits of generative AI

    1. Photo of Joe Partlow

      Joe Partlow

      Chief Technology Officer, ReliaQuest

  9. NATO Countries Must Work Together to Counter the Russian Cyber-Threat

    William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like

    1. Photo of William Hutchison

      William Hutchison

      CEO, SimSpace

  10. How To Create an Effective Patch Management Program

    Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  11. How Has GDPR Changed Our Approach to Data Protection?

    Prof Kevin Curran discusses how the GDPR has changed organizations' security practices

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  12. How AI Will Change Red Teaming

    Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  13. Achieving Cyber Resilience in Undersea Cable Networks

    Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables

    1. Photo of Chris Moore

      Chris Moore

      VP Defence & Security and CISO, OneWeb

  14. #HowTo: Limit the Impact of Data Breaches

    Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  15. Understanding the Growing Professionalism of Cyber-Criminals

    Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack

    1. Photo of Melissa Bischoping

      Melissa Bischoping

      Director of Endpoint Security Research, Tanium

  16. Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention

    Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  17. #HowTo: Protect Organizations Against ChatGPT Cyber-Threats

    Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats

    1. Photo of Jesper Trolle

      Jesper Trolle

      CEO, Exclusive Networks

  18. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  19. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  20. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

What’s Hot on Infosecurity Magazine?