Infosecurity Opinions

  1. Winning the AI Arms Race in Financial Services Cybersecurity

    Broadridge CISO David Ramirez warns that financial services will need to leverage AI to stay ahead of sophisticated threat actors

    1. Photo of David Ramirez

      David Ramirez

      CISO, Broadridge

  2. The Quantum Countdown: Preparing Today for Tomorrow’s Encryption Crisis

    Security leaders must ensure the board is aware that the quantum risk isn't theoretical, it's happening now

    1. Photo of Aparna Achanta

      Aparna Achanta

      Security Architect & Leader, IBM Consulting

    2. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, The Exeter

  3. How to Understand and Adapt to Modern Cyber Threats

    Darren Guccione warns that conventional cybersecurity is ineffective against a modern attacker

    1. Photo of Darren Guccione

      Darren Guccione

      CEO & Co-Founder, Keeper Security

  4. Building a New Generation of Security Talent Amid an Escalating Cyber Crisis

    DeVry University's Elise Awwad urges coordinated action to train new cyber professionals

    1. Photo of Elise Awwad

      Elise Awwad

      President & Chief Executive Officer, DeVry University

  5. How to Secure the UK’s Quantum Economy

    BT’s Gabriela Styf Sjöman explains how the UK can lay secure foundations for the future implementation of quantum technologies

    1. Photo of Gabriela Styf Sjöman

      Gabriela Styf Sjöman

      Managing Director, Research and Network Strategy, BT

  6. CMMC Compliance: Far More Than Just an IT Issue

    With enforcement tightening around CMMC rules, LRQA's Brian Rhodes says US defense contractors must undertake a full-scale organizational transformation to ensure compliance

    1. Photo of Brian Rhodes

      Brian Rhodes

      Head of CMMC, Americas, LRQA

  7. The Corporate Deepfake Invasion: Safeguarding Enterprises in the AI Era

    Daryl Huff says businesses must fight fire with fire when it comes to defending against the rising corporate deepfake threat

    1. Photo of Daryl Huff

      Daryl Huff

      VP of Biometrics & Identity Technologies, Jumio

  8. Driving Compliance: The Data Protection Risks of Connected Car Technology

    Jonathan Armstrong discusses the growing data security and privacy risks in connected cars

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  9. A Court Ruling on Bug Bounties Just Made the Internet Less Safe

    Congress and the Trump Administration Must Fix a Ruling prohibiting private companies from retroactively authorizing access to their systems, says Jerry Archer

    1. Photo of Jerry Archer

      Jerry Archer

      Past Board Member and Co-Founder, Cloud Security Alliance

  10. How to Address Growing Security Risks in Cyber-Physical Systems

    Francesca Boem warns that IoT security vulnerabilities affect the safety and reliability of critical systems

    1. Photo of Francesca Boem

      Francesca Boem

      Associate Professor, Electronic and Electrical Engineering Department, University College London

  11. US Cybersecurity Dealmaking Surging Amid Rising Attacks

    Policymakers have renewed their focus on closing gaps in the nation’s defenses, creating fertile ground for M&A

    1. Photo of Arlene Arin Hahn

      Arlene Arin Hahn

      Partner, White & Case LLP

    2. Photo of F. Paul Pittman

      F. Paul Pittman

      Partner, White & Case LLP

    3. Photo of Tali Sealman

      Tali Sealman

      Partner, White & Case LLP

  12. Security Leaders Must View Compliance as the Floor, Not the Ceiling

    Aparna Achanta and Tarnveer Singh argue that security leaders should treat compliance as just the beginning to raise the bar for everyone

    1. Photo of Aparna Achanta

      Aparna Achanta

      Security Architect & Leader, IBM Consulting

    2. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, The Exeter

  13. Stop Blaming the Victim: Why the Fight Against Cybercrime Needs to Change

    Kaseya’s Mike Puglia says we need to stop blaming victims of cybercrime, and treat attacks like other serious criminal activity

    1. Photo of Mike Puglia

      Mike Puglia

      General Manager, Security Suite, Kaseya

  14. Crypto-Procrastination: Preparing for a Quantum Secure Economy, Today

    Santander's Jaime Gomez Garcia says a global action plan is essential to prevent crypto-procrastination and ensure an orderly transition to quantum security

    1. Photo of Jaime Gómez García

      Jaime Gómez García

      Global Head of Quantum Threat Program, Banco Santander

  15. Building a Cybersecurity Program that Aligns with the Business

    Sushila Nair sets out seven steps to take to build a cybersecurity program that aligns with the organization's strategic direction

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  16. Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders

    Adham Etoom discusses the actions security leaders need to take to secure their systems in the AI age

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  17. How to Keep Up with Overlapping Cybersecurity Regulations in Finance

    Rabobank's Win Myat Nwe Khine advises financial firms of how to ensure compliance with growing and overlapping cybersecurity regulations

    1. Photo of Win Myat Nwe (Winny) Khine

      Win Myat Nwe (Winny) Khine

      Information Security Officer, Rabobank

  18. How Forgotten Remote Access Tools Are Putting Organizations at Risk

    Muhammad Yahya Patel explains why security teams must ensure they are protecting the entire attack surface, including remote access tools and IoT devices

    1. Photo of Muhammad Yahya Patel

      Muhammad Yahya Patel

      Global Security Evangelist & Advisor, Office of the CTO, Check Point Software

  19. DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US

    Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries

    1. Photo of Alisa Chestler

      Alisa Chestler

      Shareholder, Baker Donelson

    2. Photo of Vivien F. Peaden

      Vivien F. Peaden

      Shareholder, Baker Donelson

  20. The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses

    Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be

    1. Photo of Rebecca Steer

      Rebecca Steer

      Commercial Partner, Charles Russell Speechlys

What’s Hot on Infosecurity Magazine?