Infosecurity Opinions
Why it’s Time to Kick the Password Habit
The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption
How to Ensure Cyber Resilience Across the Supply Chain
Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks
Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?
Mike Britton argues that the new strategy is welcome, but could go further
The Impact of Artificial Intelligence on Software Development
Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development
HowTo: Challenge Deepfake Fraud
Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses
Mythbusting Through the AI Noise in Cyber: What You Need to Know
Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions
State of the Nation: Exploring the UK Cyber Landscape
Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks
How to Create a Culture of Incident Reporting
Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders
Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect
Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work
A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance
The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches
Four Cybersecurity Roles for CFOs
Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity
How to Tackle Deepfakes and Manipulation
Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes
Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises
Igor Volovich says its time for a paradigm shift in compliance strategies
Pandemic Development Risks Non-Compliance with White House Guidelines
Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy
How To Prevent Ransomware Attackers Striking Again
Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring
Reviewing the UK Government Call for Views on Supply Chain Threats
Michael Smith says that open dialogue is the first step to improving supply chain security
Generative AI: Friend or Foe?
Joe Partlow assesses the security threats and benefits of generative AI
NATO Countries Must Work Together to Counter the Russian Cyber-Threat
William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like
How To Create an Effective Patch Management Program
Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs
How Has GDPR Changed Our Approach to Data Protection?
Prof Kevin Curran discusses how the GDPR has changed organizations' security practices