Infosecurity Opinions

  1. How AI Will Change Red Teaming

    Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  2. Achieving Cyber Resilience in Undersea Cable Networks

    Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables

    1. Photo of Chris Moore

      Chris Moore

      VP Defence & Security and CISO, OneWeb

  3. #HowTo: Limit the Impact of Data Breaches

    Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  4. Understanding the Growing Professionalism of Cyber-Criminals

    Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack

    1. Photo of Melissa Bischoping

      Melissa Bischoping

      Director of Endpoint Security Research, Tanium

  5. Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention

    Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  6. #HowTo: Protect Organizations Against ChatGPT Cyber-Threats

    Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats

    1. Photo of Jesper Trolle

      Jesper Trolle

      CEO, Exclusive Networks

  7. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  8. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  9. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

  10. Padding Users’ Defenses Against ChatGPT

    FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  11. #HowTo: Create and Maintain SBOMs

    Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  12. Why Apps Like TikTok Can Be a Security Issue for Your Business

    Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment

    1. Photo of Frank Johnson

      Frank Johnson

      vice president of US Federal, Lookout Inc

  13. The Open-Source Software in Our Pockets Needs Our Help

    Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb

    1. Photo of Jacobo McGuire

      Jacobo McGuire

      policy research intern, Chainguard

    2. Photo of John Speed Meyers

      John Speed Meyers

      principal security scientist, Chainguard

  14. #HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises

    Jim Nitterauer argues that by thinking outside the box, MSEs can manage risk with less staff, limited security tools and smaller budgets

    1. Photo of Jim Nitterauer

      Jim Nitterauer

      director, information security, Graylog

  15. Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

    Rising attacks targeting the gaming sector are undermining consumer trust and decreasing sales

    1. Photo of Andrew Whaley

      Andrew Whaley

      senior technical director, Promon

  16. Insider Threats in the Work from Home Age

    Christos Flessas explains why the shift to remote work has increased insider threat risks to organizations

    1. Photo of Christos Flessas

      Christos Flessas

      Communications and Information Systems Engineer, Hellenic Air Force

  17. Why the UK Government Must End its Senseless Encryption Demands

    Will UK government plans to ban end-to-end encryption in messaging services damage consumers' privacy and security?

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  18. #HowTo: Improve Your Cyber Resilience

    SecurityScorecard's Alexander Heid sets out four steps to improve your organization's cyber resilience

    1. Photo of Alexander Heid

      Alexander Heid

      chief research and development officer, SecurityScorecard

  19. Navigating AI Job Losses: Balancing Progress and Social Responsibility

    Nikki Webb explores the ethical implications of job losses due to AI, with a focus on the personal impact on individuals

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  20. ChatGPT: Not All Gloom and Doom for Security Professionals

    Chris Jacobs urges the security community to stop focusing solely on the risks of ChatGPT, and start looking at the potential gains

    1. Photo of Chris Jacob

      Chris Jacob

      global vice president, threat intelligence engineers, ThreatQuotient

What’s hot on Infosecurity Magazine?