Infosecurity Opinions

  1. Preserving Digital Trust in an Era of Rapidly Evolving Threats

    Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats

    1. Photo of Linda Betz

      Linda Betz

      Acting CISO, FS-ISAC

  2. Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout

    Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats

    1. Photo of Mark Wojtasiak

      Mark Wojtasiak

      VP of Product Strategy, Vectra AI

  3. Responsible Cyber Operations: From Theory to Reality

    Nick Beecroft discusses how to create a doctrine for being a responsible cyber power

    1. Photo of Nick Beecroft

      Nick Beecroft

      International Cybersecurity Lead, BAE Systems

  4. Are Tabletop Exercises Still Relevant for Modern Cybersecurity?

    Dotan Nahum sets out how to make the most of tabletop exercises in 2023 and beyond

    1. Photo of Dotan Nahum

      Dotan Nahum

      Head of Developer-First Security, Check Point Software Technologies

  5. How the Rise of Deepfakes Will Impact the 2024 Presidential Elections

    Blair Cohen says it is time to harness AI’s power to minimize the impact deepfakes could have on the democratic process

    1. Photo of Blair Cohen

      Blair Cohen

      President & Founder, AuthenticID

  6. #CyberMonth: Why Boardrooms Need a Stronger CISO Influence

    Tony Buffomante discusses how to break the ice between cyber experts and board members

    1. Photo of Tony Buffomante

      Tony Buffomante

      global head of cybersecurity and risk services, Wipro

  7. Challenging Old Ideas: The Ongoing Need to Empower Women in Tech

    Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce

    1. Photo of Jen Taylor

      Jen Taylor

      chief product officer, Cloudflare

  8. #CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be

    Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution

    1. Photo of Stu Sjouwerman

      Stu Sjouwerman

      Founder and CEO, KnowBe4

  9. #CyberMonth: Six Steps to Build a Positive Security Culture

    Fred Kwong says effective security culture requires commitment from the top down

    1. Photo of Fred Kwong

      Fred Kwong

      VP, CISO, DeVry University

  10. How to Comply with API Security Requirements in PCI DSS Version 4.0

    Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards

    1. Photo of Corey Ball

      Corey Ball

      chief hacking officer and senior manager, Moss Adams LLP

    2. Photo of Casey Wassom

      Casey Wassom

      cybersecurity senior manager, Moss Adams LLP

  11. Four Data Security Challenges Set to Impact Organizations in the Coming Years

    Steve Durbin sets out how organizations can prepare for significant security risks implicit with data

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  12. No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!

    Alex Haynes highlights the challenges of communicating cybersecurity to a largely non-technical mass audience

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  13. #NITAM: A Surge in Quiet and Loud Quitters Presents New Threats

    Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats

    1. Photo of Elizabeth Harz

      Elizabeth Harz

      CEO, Veriato

  14. How Will the Cyber Pathways Impact Your Career?

    Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  15. Time to Demand IT Security by Design and Default

    Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services

    1. Photo of Toby Sibley

      Toby Sibley

      Security Expert, PA Consulting

  16. Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework

    Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny

    1. Photo of Cédric  Burton

      Cédric Burton

      Partner, Global Co-Chair Privacy and Cybersecurity, Wilson Sonsini

    2. Photo of Tom Evans

      Tom Evans

      Senior Associate, Privacy and Cybersecurity, Wilson Sonsini

  17. How to Prepare for NIS2

    Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  18. Why Businesses Ignore Incident Response at Their Peril

    Phil Robinson explores the dangers around businesses lethargy towards incident response planning

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  19. The Gender Gap is Widening in Cyber – What Can We Do About it?

    Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity

    1. Photo of Kim Wiles

      Kim Wiles

      Government Cyber Services Expert and Product Manager, Nominet

  20. It’s Time to Elevate the Humble SBOM

    Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

What’s hot on Infosecurity Magazine?