Infosecurity Opinions

How to Put Humans at the Forefront of Retail Cyber Defense
PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees

Cyber House Party: A Journey of Connection, Music and Purpose
Cyber House Party returns to Infosecurity Europe 2025

Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground
Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations

The True Value of Undersea Cable Security
Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them

Analyzing the Current Cloud Threat Landscape
Paolo Passeri sets out current trends in the cloud threat landscape

Businesses Should Take a Lifecycle Approach to Device Security
HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework
Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react

AI's Dark Side: The Emergence of Hallucinations in the Digital Age
KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations

The Ursala of AI Wants Your Voice
Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies

It’s Time to Stop Accepting Losses in Cybersecurity
John Kindervag argues that we should shift from risk management to danger management in cybersecurity

Rethinking Resilience for the Age of AI-Driven Cybercrime
Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility

Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths
Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age

Challenges Facing the UK Government’s Proposed Ransomware Ban
Andrew Rose discusses issues and pitfalls around the UK government's proposed ransomware payment ban

How Security Professionals Can Prepare for the CISO Role
ISACA's Sushila Nair explains the different skills security professionals need to learn during their careers to prepare for leadership positions

Preparing for the Realities of a Ransomware Confrontation
Raj Samani advises on how to prepare for the reality of facing a ransomware demand

Combating the Invisible Threat of In-Memory Cyber-Attacks
Brad LaPorte discusses the growing trend of in memory, runtime-based attacks, which are exceptionally difficult for defenders to detect

From Legacy Systems to 5G: Enterprise Security Threats in 2025
The GSMA's Sam Knight sets out the ways attackers are targeting expanding attack surfaces

Incident Management: How to Ensure Your Organization Can Handle a Crisis
TD Bank's Gaya Ratnam discusses how organizations can improve their incident management amid surging cyber attacks

Zero Trust Must be a Cybersecurity Priority for the Trump Administration
To safeguard US systems against threat actors like Salt Typhoon, Trump Should Double Down on Biden’s Zero Trust Initiatives

Third-Party Cyber Risk Management: Taking a Strategic Approach
Travelers' Jaime Palumbo discusses the third-party cyber risk landscape, and actions organizations need to take to address this threat























