Infosecurity Opinions

  1. How to Securely Manage the Data of Vulnerable Groups

    Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  2. Why it’s Time to Kick the Password Habit

    The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  3. How to Ensure Cyber Resilience Across the Supply Chain

    Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

    1. Photo of Apu Pavithran

      Apu Pavithran

      CEO and Founder, Hexnode

  4. Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?

    Mike Britton argues that the new strategy is welcome, but could go further

    1. Photo of Mike Britton

      Mike Britton

      CISO, Abnormal Security

  5. The Impact of Artificial Intelligence on Software Development

    Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

    1. Photo of Jamie Boote

      Jamie Boote

      associate principal consultant, Synopsys

  6. HowTo: Challenge Deepfake Fraud

    Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

    1. Photo of Alisdair Faulkner

      Alisdair Faulkner

      founder and CEO, Darwinium

  7. Mythbusting Through the AI Noise in Cyber: What You Need to Know

    Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  8. State of the Nation: Exploring the UK Cyber Landscape

    Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

    1. Photo of Deryck Mitchelson

      Deryck Mitchelson

      Field CISO EMEA, Check Point Software Technologies

  9. How to Create a Culture of Incident Reporting

    Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  10. Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect

    Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

    1. Photo of Carsten Rhod Gregersen

      Carsten Rhod Gregersen

      CEO and Founder, Nabto

  11. A Cybersecurity Wake-Up Call: It's Time to Take a Fresh Stance

    The explosion of eCommerce has created a new landscape for cybersecurity, with businesses of all sizes now at risk of data breaches

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  12. Four Cybersecurity Roles for CFOs

    Cameron Over discusses how CFOs and extend their strengths to the field of cybersecurity

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

What’s hot on Infosecurity Magazine?