Infosecurity Opinions

#HowTo: Mitigate Burnout for Cybersecurity Staff
Julien Soriano explains why minimizing burnout in cyber professionals is so crucial to organizations' security

A Decade On – What’s Happened to Crowdsourced Security?
Alex Haynes reflects the impact of crowdsourced security on the cyber industry so far

Mayday, Mayday our Network is Going Down
How cybersecurity can learn lessons from aviation’s response to serious incidents

The Real Threats and Opportunities of ChatGPT
There's been a lack of focus on the huge security benefits of ChatGPT, says Cequence's Jason Kent

Why European Space Cybersecurity Matters
We have an unprecedented opportunity to create a secure ecosystem to protect the critical space sector, says CYSAT's Mathieu Bailly

Pulling Back the Curtain to Address TikTok Security Concerns
People are key to the success of any cybersecurity plan around TikTok, says ThreatBlockr's Pat McGarry

HowTo: Protect Software by Understanding Your Environment
Software is a big target for cyber-criminals, and organizations must understand their environment to secure it

Data Security Best-Practice in a World of Evolving Risks and Regulations
Organizations with a uniform approach to data management and access control can increase their security and compliance

How Website Tracking Technologies Are Transforming Risk Analysis Across Industries
The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology

#HowTo: Reduce Risk and Complexity in Cloud Networks
John Moran discusses how security to move from inhibitor to enabler to organizations multi-cloud strategies

Why Security Pros Need to Escape the Cyber Bubble
The cybersecurity community agrees on so much, but why do we still argue over the same things?

The Anatomy of an Insider Threat
People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism

Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities
Satellites provide critical services, meaning cyber-attacks can cause widespread disruption

#HowTo: Reduce Cyber Risks Amid Surging Threats
Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape

The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape
Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats

Taking a Different Approach to Tackle the Cyber Skills Gap
Cyber professionals continue to walk in search of higher pay and better working conditions, so what can the business do to improve retention?

#HowTo: Secure AI and its Software Supply Chains
Dan Conn discusses what needs to be done to secure AI and its software supply chains

Make Secure-by-Design Possible at University and Beyond
Amy Baker discusses how secure coding training can become integrated both in college and industry

New State-Wide Privacy Laws Could Have Unintended Consequences for Consumers and Businesses
Ev Kontsevoy argues the federal government will eventually need to step in for a lasting privacy solution

Understanding Business Resilience: There’s More to it Than Meets the Eye
Business resilience goes far beyond having watertight cybersecurity
























