Infosecurity Opinions

  1. The UK-US Data Bridge: How to Simplify Transfers Across the Atlantic

    Tim Hickman sets out practical considerations for organizations applying the new UK-US data bridge mechanism

    1. Photo of Tim Hickman

      Tim Hickman

      Partner, White & Case LLP

  2. Navigating Investment, Innovation, and Regulation in Cyber Next Year

    Julian Cunningham-Day says businesses must learn how to navigate an increasingly complex legal and risk landscape next year

    1. Photo of Julian Cunningham-Day

      Julian Cunningham-Day

      TMT Partner and Global Co-Head of Fintech, Linklaters

  3. Is Your Kettle Spying on You? The Reality of IoT Device Security

    Shahram Mossayebi says we must embrace quantum-proof security measures now to stay ahead in the race against criminals

    1. Photo of Shahram Mossayebi

      Shahram Mossayebi

      CEO and Co-Founder, Crypto Quantique

  4. How to Comply with Ever-Changing Data Protection Regulations

    Katie Simmonds sets out the main challenges organizations face in achieving compliance with data privacy regulations

    1. Photo of Katie  Simmonds

      Katie Simmonds

      Managing Associate, Womble Bond Dickinson

  5. The CISO Journey in 2024: Looking at the Year Ahead

    As security threats grow more sophisticated and new regulations emerge, CISOs face an increasingly challenging job landscape

    1. Photo of Kayla  Williams

      Kayla Williams

      CISO, Devo

  6. Demystifying Cyber Resilience: From Best Practice to Execution

    Francesco Chiarini, founder of High Value Target, explores what cyber resilience truly means for organizations – and how they can achieve it

    1. Photo of Francesco Chiarini

      Francesco Chiarini

      Founder & Chief Researcher, High Value Target

  7. Why Meeting the SEC’s Board Diversity Rules Benefits Your Organization

    Larry Whiteside Jr. explains why increasing the diversity of boardrooms is good for business and security

    1. Photo of Larry  Whiteside Jr

      Larry Whiteside Jr

      Co-Founder and President, Cyversity and CISO, RegScale

  8. Why Centralizing Your Content is Vital for Privacy Compliance

    Box's Leah Perry discusses how organizations can handle fluctuations in privacy laws around the globe

    1. Photo of Leah Perry

      Leah Perry

      Chief Privacy Officer, Box

  9. Organizations Must Embrace Dynamic Honeypots to Outpace Attackers

    Honeypots are no longer effective against sophisticated cyberattacks, and organizations should consider using dynamic AI-based honeypots instead

    1. Photo of Kunal  Anand

      Kunal Anand

      CTO & CISO at Imperva

  10. How to Avoid Fraud on Black Friday

    Cybersecurity experts share tips for consumers, businesses and retailers on protecting against e-commerce scams this Black Friday and Cyber Monday

  11. From Brews to Privacy Blues: Balancing Innovation and Privacy in the Digital Age

    Businesses should follow key takeaways from the Tim Hortons app investigation to strike the right balance between innovation and privacy protection

    1. The Roberts & Obradovic Team

      Roberts * Obradovic

  12. We’ve Come a Long Way in Cybersecurity…But There is a Long Way to Go

    Cybersecurity threats have become more sophisticated, requiring businesses and society as a whole to enhance their awareness and protection measures

    1. Photo of Chris Dimitriadis

      Chris Dimitriadis

      Chief Global Strategy Officer, ISACA

  13. Protection from Chip to Cloud: Tackling Emerging Security Risks in the Age of AI

    Microsoft's Alan Slothower highlights the growing threat to firmware security from generative AI

    1. Photo of Alan Slothower

      Alan Slothower

      Head of Surface Commercial UK, Microsoft

  14. Why Enterprises and Governments Must Prepare for Q-Day Now

    Quantum computers are here and in use - governments and enterprises must protect themselves against the risks

    1. Photo of Chris Johnson

      Chris Johnson

      Senior Vice President & Global Head of Enterprise, Nokia

  15. Forcing Security Expertise on Boards is Not the Answer, Here's What Is

    CISOs should be given a voice at the board table to communicate cybersecurity risks and obtain buy-in for remediation

    1. Photo of Jason Rebholz

      Jason Rebholz

      CISO, Corvus Insurance

  16. #CyberMonth: Strengthening Cybersecurity Resilience by Going Beyond Blame

    Steve Forbes says human intelligence will be indispensable in the battle against AI-based phishing attacks

    1. Photo of Steve Forbes

      Steve Forbes

      government cyber security expert, Nominet

  17. 3 Things CISOs Should Be Doing This Cybersecurity Awareness Month and Beyond

    Cybersecurity Awareness Month is a pivotal time to assess your enterprise's cybersecurity posture beyond the basics of multi-factor authentication, strong passwords, and up-to-date software

    1. Photo of Michael Armer

      Michael Armer

      CISO, RingCentral

  18. Preserving Digital Trust in an Era of Rapidly Evolving Threats

    Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats

    1. Photo of Linda Betz

      Linda Betz

      Acting CISO, FS-ISAC

  19. Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout

    Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats

    1. Photo of Mark Wojtasiak

      Mark Wojtasiak

      VP of Product Strategy, Vectra AI

  20. Responsible Cyber Operations: From Theory to Reality

    Nick Beecroft discusses how to create a doctrine for being a responsible cyber power

    1. Photo of Nick Beecroft

      Nick Beecroft

      International Cybersecurity Lead, BAE Systems

What’s hot on Infosecurity Magazine?