Infosecurity Opinions

Stop Blaming the Victim: Why the Fight Against Cybercrime Needs to Change
Kaseya’s Mike Puglia says we need to stop blaming victims of cybercrime, and treat attacks like other serious criminal activity

Crypto-Procrastination: Preparing for a Quantum Secure Economy, Today
Santander's Jaime Gomez Garcia says a global action plan is essential to prevent crypto-procrastination and ensure an orderly transition to quantum security

Building a Cybersecurity Program that Aligns with the Business
Sushila Nair sets out seven steps to take to build a cybersecurity program that aligns with the organization's strategic direction

Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders
Adham Etoom discusses the actions security leaders need to take to secure their systems in the AI age

How to Keep Up with Overlapping Cybersecurity Regulations in Finance
Rabobank's Win Myat Nwe Khine advises financial firms of how to ensure compliance with growing and overlapping cybersecurity regulations

How Forgotten Remote Access Tools Are Putting Organizations at Risk
Muhammad Yahya Patel explains why security teams must ensure they are protecting the entire attack surface, including remote access tools and IoT devices

DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US
Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries

The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses
Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be

How to Put Humans at the Forefront of Retail Cyber Defense
PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees

Cyber House Party: A Journey of Connection, Music and Purpose
Cyber House Party returns to Infosecurity Europe 2025

Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground
Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations

The True Value of Undersea Cable Security
Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them

Analyzing the Current Cloud Threat Landscape
Paolo Passeri sets out current trends in the cloud threat landscape

Businesses Should Take a Lifecycle Approach to Device Security
HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework
Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react

AI's Dark Side: The Emergence of Hallucinations in the Digital Age
KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations

The Ursala of AI Wants Your Voice
Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies

It’s Time to Stop Accepting Losses in Cybersecurity
John Kindervag argues that we should shift from risk management to danger management in cybersecurity

Rethinking Resilience for the Age of AI-Driven Cybercrime
Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility

Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths
Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age

























