Infosecurity Opinions

  1. Stop Blaming the Victim: Why the Fight Against Cybercrime Needs to Change

    Kaseya’s Mike Puglia says we need to stop blaming victims of cybercrime, and treat attacks like other serious criminal activity

    1. Photo of Mike Puglia

      Mike Puglia

      General Manager, Security Suite, Kaseya

  2. Crypto-Procrastination: Preparing for a Quantum Secure Economy, Today

    Santander's Jaime Gomez Garcia says a global action plan is essential to prevent crypto-procrastination and ensure an orderly transition to quantum security

    1. Photo of Jaime Gómez García

      Jaime Gómez García

      Global Head of Quantum Threat Program, Banco Santander

  3. Building a Cybersecurity Program that Aligns with the Business

    Sushila Nair sets out seven steps to take to build a cybersecurity program that aligns with the organization's strategic direction

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  4. Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders

    Adham Etoom discusses the actions security leaders need to take to secure their systems in the AI age

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  5. How to Keep Up with Overlapping Cybersecurity Regulations in Finance

    Rabobank's Win Myat Nwe Khine advises financial firms of how to ensure compliance with growing and overlapping cybersecurity regulations

    1. Photo of Win Myat Nwe (Winny) Khine

      Win Myat Nwe (Winny) Khine

      Information Security Officer, Rabobank

  6. How Forgotten Remote Access Tools Are Putting Organizations at Risk

    Muhammad Yahya Patel explains why security teams must ensure they are protecting the entire attack surface, including remote access tools and IoT devices

    1. Photo of Muhammad Yahya Patel

      Muhammad Yahya Patel

      Global Security Evangelist & Advisor, Office of the CTO, Check Point Software

  7. DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US

    Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries

    1. Photo of Alisa Chestler

      Alisa Chestler

      Shareholder, Baker Donelson

    2. Photo of Vivien F. Peaden

      Vivien F. Peaden

      Shareholder, Baker Donelson

  8. The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses

    Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be

    1. Photo of Rebecca Steer

      Rebecca Steer

      Commercial Partner, Charles Russell Speechlys

  9. How to Put Humans at the Forefront of Retail Cyber Defense

    PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees

    1. Photo of Richard Allen

      Richard Allen

      Cybersecurity Expert, PA Consulting

  10. Cyber House Party: A Journey of Connection, Music and Purpose

    Cyber House Party returns to Infosecurity Europe 2025

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  11. Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground

    Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations

    1. Photo of Daniel Kapellmann Zafra

      Daniel Kapellmann Zafra

      Security Engineer, Google Threat Intelligence Group

  12. The True Value of Undersea Cable Security

    Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them

    1. Photo of Federico Bruni

      Federico Bruni

      Manager, Frontier Economics

  13. Analyzing the Current Cloud Threat Landscape

    Paolo Passeri sets out current trends in the cloud threat landscape

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. Businesses Should Take a Lifecycle Approach to Device Security

    HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

    1. Photo of Alex Holland

      Alex Holland

      Principal Threat Researcher, HP

  15. Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework

    Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react

    1. Photo of Dr Divya Sridhar

      Dr Divya Sridhar

      Vice President, Global Privacy Initiatives & Operations, BBB National Programs

  16. AI's Dark Side: The Emergence of Hallucinations in the Digital Age

    KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations

    1. Photo of Indy Dhami

      Indy Dhami

      Partner, Cyber Security, Financial Services Advisory, KPMG

  17. The Ursala of AI Wants Your Voice

    Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies

    1. Photo of Leeza Garber

      Leeza Garber

      Privacy & Cybersecurity Attorney

    2. Photo of Gail Gottehrer

      Gail Gottehrer

      Corporate Lawyer and Cybersecurity Executive

  18. It’s Time to Stop Accepting Losses in Cybersecurity

    John Kindervag argues that we should shift from risk management to danger management in cybersecurity

    1. Photo of John Kindervag

      John Kindervag

      Creator of Zero Trust and Chief Evangelist Officer at Illumio

  19. Rethinking Resilience for the Age of AI-Driven Cybercrime

    Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  20. Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths

    Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age

    1. Photo of Keatron Evans

      Keatron Evans

      VP of Portfolio Product and AI Strategy, Infosec Institute

What’s Hot on Infosecurity Magazine?