Infosecurity Opinions
Is Your Kettle Spying on You? The Reality of IoT Device Security
Shahram Mossayebi says we must embrace quantum-proof security measures now to stay ahead in the race against criminals
How to Comply with Ever-Changing Data Protection Regulations
Katie Simmonds sets out the main challenges organizations face in achieving compliance with data privacy regulations
The CISO Journey in 2024: Looking at the Year Ahead
As security threats grow more sophisticated and new regulations emerge, CISOs face an increasingly challenging job landscape
Demystifying Cyber Resilience: From Best Practice to Execution
Francesco Chiarini, founder of High Value Target, explores what cyber resilience truly means for organizations – and how they can achieve it
Why Meeting the SEC’s Board Diversity Rules Benefits Your Organization
Larry Whiteside Jr. explains why increasing the diversity of boardrooms is good for business and security
Why Centralizing Your Content is Vital for Privacy Compliance
Box's Leah Perry discusses how organizations can handle fluctuations in privacy laws around the globe
Organizations Must Embrace Dynamic Honeypots to Outpace Attackers
Honeypots are no longer effective against sophisticated cyberattacks, and organizations should consider using dynamic AI-based honeypots instead
How to Avoid Fraud on Black Friday
Cybersecurity experts share tips for consumers, businesses and retailers on protecting against e-commerce scams this Black Friday and Cyber Monday
From Brews to Privacy Blues: Balancing Innovation and Privacy in the Digital Age
Businesses should follow key takeaways from the Tim Hortons app investigation to strike the right balance between innovation and privacy protection
We’ve Come a Long Way in Cybersecurity…But There is a Long Way to Go
Cybersecurity threats have become more sophisticated, requiring businesses and society as a whole to enhance their awareness and protection measures
Protection from Chip to Cloud: Tackling Emerging Security Risks in the Age of AI
Microsoft's Alan Slothower highlights the growing threat to firmware security from generative AI
Why Enterprises and Governments Must Prepare for Q-Day Now
Quantum computers are here and in use - governments and enterprises must protect themselves against the risks