Infosecurity Opinions

  1. Are Tabletop Exercises Still Relevant for Modern Cybersecurity?

    Dotan Nahum sets out how to make the most of tabletop exercises in 2023 and beyond

    1. Photo of Dotan Nahum

      Dotan Nahum

      Head of Developer-First Security, Check Point Software Technologies

  2. How the Rise of Deepfakes Will Impact the 2024 Presidential Elections

    Blair Cohen says it is time to harness AI’s power to minimize the impact deepfakes could have on the democratic process

    1. Photo of Blair Cohen

      Blair Cohen

      President & Founder, AuthenticID

  3. #CyberMonth: Why Boardrooms Need a Stronger CISO Influence

    Tony Buffomante discusses how to break the ice between cyber experts and board members

    1. Photo of Tony Buffomante

      Tony Buffomante

      global head of cybersecurity and risk services, Wipro

  4. Challenging Old Ideas: The Ongoing Need to Empower Women in Tech

    Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce

    1. Photo of Jen Taylor

      Jen Taylor

      chief product officer, Cloudflare

  5. #CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be

    Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution

    1. Photo of Stu Sjouwerman

      Stu Sjouwerman

      Founder and CEO, KnowBe4

  6. #CyberMonth: Six Steps to Build a Positive Security Culture

    Fred Kwong says effective security culture requires commitment from the top down

    1. Photo of Fred Kwong

      Fred Kwong

      VP, CISO, DeVry University

  7. How to Comply with API Security Requirements in PCI DSS Version 4.0

    Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards

    1. Photo of Corey Ball

      Corey Ball

      chief hacking officer and senior manager, Moss Adams LLP

    2. Photo of Casey Wassom

      Casey Wassom

      cybersecurity senior manager, Moss Adams LLP

  8. Four Data Security Challenges Set to Impact Organizations in the Coming Years

    Steve Durbin sets out how organizations can prepare for significant security risks implicit with data

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  9. No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!

    Alex Haynes highlights the challenges of communicating cybersecurity to a largely non-technical mass audience

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  10. #NITAM: A Surge in Quiet and Loud Quitters Presents New Threats

    Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats

    1. Photo of Elizabeth Harz

      Elizabeth Harz

      CEO, Veriato

  11. How Will the Cyber Pathways Impact Your Career?

    Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  12. Time to Demand IT Security by Design and Default

    Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services

    1. Toby Sibley

      security and operational resilience expert, PA Consulting

  13. Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework

    Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny

    1. Photo of Cédric  Burton

      Cédric Burton

      Partner, Global Co-Chair Privacy and Cybersecurity, Wilson Sonsini

    2. Photo of Tom Evans

      Tom Evans

      Senior Associate, Privacy and Cybersecurity, Wilson Sonsini

  14. How to Prepare for NIS2

    Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  15. Why Businesses Ignore Incident Response at Their Peril

    Phil Robinson explores the dangers around businesses lethargy towards incident response planning

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  16. The Gender Gap is Widening in Cyber – What Can We Do About it?

    Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity

    1. Photo of Kim Wiles

      Kim Wiles

      Government Cyber Services Expert and Product Manager, Nominet

  17. It’s Time to Elevate the Humble SBOM

    Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  18. Navigating the Future with Generative AI: Treating AI as a Trusted Colleague

    Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool

    1. Photo of Craig Civil

      Craig Civil

      Director of Data Science and Artificial Intelligence, BSI Group

  19. Paving a Path to Security by Design Across the Industry

    SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  20. How to Securely Manage the Data of Vulnerable Groups

    Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

What’s hot on Infosecurity Magazine?