Infosecurity Opinions

#HowTo: Become an Enabler for Change as a CISO
CISOs must overcome time and resource challenges to become enablers of change within their organization

Businesses Must Move Beyond the Reactive Approach to Cybersecurity
By shifting to a proactive and more strategic approach, security professionals can build a risk-aware culture in their organization

Cyber Warfare is Upon Us: Why the Next Generation of ‘War Games’ so Important
Modern businesses are increasingly used as pawns in cyber battles between nation-states and affiliated groups

#HowTo: Improve Your Company’s Cybersecurity Training
With human error responsible for 95% of cybersecurity breaches, it's crucial that companies enhance their cyber training programs

5 Reasons Why Cyber Matters for CFOs
There is a growing imperative for CFOs and OCFO teams to increase their cyber acumen and work closer with CISOs

Over a Year of Log4j Lingering: Why We Need to Stop Viewing High-Severity Breaches as Anomalies
Steven Stone explains why we won't see the back of vulnerabilities like Log4j for some time

Why Cyber Mindfulness is the Future of Cybersecurity
Yvonne Eskenzi discusses how mindfulness can reduce the risk of stress and burnout in cybersecurity professionals

#HowTo: Create an Effective Red Team
Red teaming is now a common element of cybersecurity, but organization must ensure the teams they work with meet certain requirements

Regulations for SBOMs are Useless if You Cannot Take Action
SBOMs must be actionable and enforceable to have a significant impact in improving software security

QR Codes: A Growing Vulnerability to Cybercrimes
NCC's Rick Crandall discusses how cyber-criminals are leveraging QR codes to launch attacks and advice for consumers to avoid becoming victims

The Race Against Quantum: It’s Not Too Late to be the Tortoise that Beat the Hare
The race to defend against cyber threats brought on by quantum computing is on, and Jon France, CISO of (ISC)2, says the cyber industry must catch up

#HowTo: Fight the Use of Deepfakes in ID Theft
The ability to tell fake content from reality and how this applies to our online identities is a growing challenge amid the rise of deepfakes