Infosecurity Opinions

  1. Why it’s Time to Kick the Password Habit

    The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  2. How to Ensure Cyber Resilience Across the Supply Chain

    Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

    1. Photo of Apu Pavithran

      Apu Pavithran

      CEO and Founder, Hexnode

  3. Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?

    Mike Britton argues that the new strategy is welcome, but could go further

    1. Photo of Mike Britton

      Mike Britton

      CISO, Abnormal Security

  4. The Impact of Artificial Intelligence on Software Development

    Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

    1. Photo of Jamie Boote

      Jamie Boote

      associate principal consultant, Synopsys

  5. HowTo: Challenge Deepfake Fraud

    Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

    1. Photo of Alisdair Faulkner

      Alisdair Faulkner

      founder and CEO, Darwinium

  6. Mythbusting Through the AI Noise in Cyber: What You Need to Know

    Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  7. State of the Nation: Exploring the UK Cyber Landscape

    Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

    1. Photo of Deryck Mitchelson

      Deryck Mitchelson

      Field CISO EMEA, Check Point Software Technologies

  8. How to Create a Culture of Incident Reporting

    Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  9. Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect

    Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

    1. Photo of Carsten Rhod Gregersen

      Carsten Rhod Gregersen

      CEO and Founder, Nabto

  10. A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance

    The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  11. Four Cybersecurity Roles for CFOs

    Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  12. How to Tackle Deepfakes and Manipulation

    Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  13. Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises

    Igor Volovich says its time for a paradigm shift in compliance strategies

    1. Photo of Igor Volovich

      Igor Volovich

      VP of Compliance Strategy, Qmulos

  14. Pandemic Development Risks Non-Compliance with White House Guidelines

    Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy

    1. Photo of Meredith Bell

      Meredith Bell

      CEO, AutoRABIT

  15. How To Prevent Ransomware Attackers Striking Again

    Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

    1. Photo of Charles Smith

      Charles Smith

      Consulting Solutions Engineer, Data Protection, Barracuda

  16. Reviewing the UK Government Call for Views on Supply Chain Threats

    Michael Smith says that open dialogue is the first step to improving supply chain security

    1. Photo of Michael Smith

      Michael Smith

      Field CTO, Vercara

  17. Generative AI: Friend or Foe?

    Joe Partlow assesses the security threats and benefits of generative AI

    1. Photo of Joe Partlow

      Joe Partlow

      Chief Technology Officer, ReliaQuest

  18. NATO Countries Must Work Together to Counter the Russian Cyber-Threat

    William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like

    1. Photo of William Hutchison

      William Hutchison

      CEO, SimSpace

  19. How To Create an Effective Patch Management Program

    Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  20. How Has GDPR Changed Our Approach to Data Protection?

    Prof Kevin Curran discusses how the GDPR has changed organizations' security practices

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

What’s hot on Infosecurity Magazine?