Infosecurity Opinions

  1. US Cybersecurity Dealmaking Surging Amid Rising Attacks

    Policymakers have renewed their focus on closing gaps in the nation’s defenses, creating fertile ground for M&A

    1. Photo of Arlene Arin Hahn

      Arlene Arin Hahn

      Partner, White & Case LLP

    2. Photo of F. Paul Pittman

      F. Paul Pittman

      Partner, White & Case LLP

    3. Photo of Tali Sealman

      Tali Sealman

      Partner, White & Case LLP

  2. Security Leaders Must View Compliance as the Floor, Not the Ceiling

    Aparna Achanta and Tarnveer Singh argue that security leaders should treat compliance as just the beginning to raise the bar for everyone

    1. Photo of Aparna Achanta

      Aparna Achanta

      Security Architect & Leader, IBM Consulting

    2. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, The Exeter

  3. Stop Blaming the Victim: Why the Fight Against Cybercrime Needs to Change

    Kaseya’s Mike Puglia says we need to stop blaming victims of cybercrime, and treat attacks like other serious criminal activity

    1. Photo of Mike Puglia

      Mike Puglia

      General Manager, Security Suite, Kaseya

  4. Crypto-Procrastination: Preparing for a Quantum Secure Economy, Today

    Santander's Jaime Gomez Garcia says a global action plan is essential to prevent crypto-procrastination and ensure an orderly transition to quantum security

    1. Photo of Jaime Gómez García

      Jaime Gómez García

      Global Head of Quantum Threat Program, Banco Santander

  5. Building a Cybersecurity Program that Aligns with the Business

    Sushila Nair sets out seven steps to take to build a cybersecurity program that aligns with the organization's strategic direction

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  6. Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders

    Adham Etoom discusses the actions security leaders need to take to secure their systems in the AI age

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  7. How to Keep Up with Overlapping Cybersecurity Regulations in Finance

    Rabobank's Win Myat Nwe Khine advises financial firms of how to ensure compliance with growing and overlapping cybersecurity regulations

    1. Photo of Win Myat Nwe (Winny) Khine

      Win Myat Nwe (Winny) Khine

      Information Security Officer, Rabobank

  8. How Forgotten Remote Access Tools Are Putting Organizations at Risk

    Muhammad Yahya Patel explains why security teams must ensure they are protecting the entire attack surface, including remote access tools and IoT devices

    1. Photo of Muhammad Yahya Patel

      Muhammad Yahya Patel

      Global Security Evangelist & Advisor, Office of the CTO, Check Point Software

  9. DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US

    Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries

    1. Photo of Alisa Chestler

      Alisa Chestler

      Shareholder, Baker Donelson

    2. Photo of Vivien F. Peaden

      Vivien F. Peaden

      Shareholder, Baker Donelson

  10. The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses

    Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be

    1. Photo of Rebecca Steer

      Rebecca Steer

      Commercial Partner, Charles Russell Speechlys

  11. How to Put Humans at the Forefront of Retail Cyber Defense

    PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees

    1. Photo of Richard Allen

      Richard Allen

      Cybersecurity Expert, PA Consulting

  12. Cyber House Party: A Journey of Connection, Music and Purpose

    Cyber House Party returns to Infosecurity Europe 2025

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  13. Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground

    Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations

    1. Photo of Daniel Kapellmann Zafra

      Daniel Kapellmann Zafra

      Security Engineer, Google Threat Intelligence Group

  14. The True Value of Undersea Cable Security

    Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them

    1. Photo of Federico Bruni

      Federico Bruni

      Manager, Frontier Economics

  15. Analyzing the Current Cloud Threat Landscape

    Paolo Passeri sets out current trends in the cloud threat landscape

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. Businesses Should Take a Lifecycle Approach to Device Security

    HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

    1. Photo of Alex Holland

      Alex Holland

      Principal Threat Researcher, HP

  17. Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework

    Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react

    1. Photo of Dr Divya Sridhar

      Dr Divya Sridhar

      Vice President, Global Privacy Initiatives & Operations, BBB National Programs

  18. AI's Dark Side: The Emergence of Hallucinations in the Digital Age

    KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations

    1. Photo of Indy Dhami

      Indy Dhami

      Partner, Cyber Security, Financial Services Advisory, KPMG

  19. The Ursala of AI Wants Your Voice

    Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies

    1. Photo of Leeza Garber

      Leeza Garber

      Privacy & Cybersecurity Attorney

    2. Photo of Gail Gottehrer

      Gail Gottehrer

      Corporate Lawyer and Cybersecurity Executive

  20. It’s Time to Stop Accepting Losses in Cybersecurity

    John Kindervag argues that we should shift from risk management to danger management in cybersecurity

    1. Photo of John Kindervag

      John Kindervag

      Creator of Zero Trust and Chief Evangelist Officer at Illumio

What’s Hot on Infosecurity Magazine?