Infosecurity Opinions

  1. #NITAM: A Surge in Quiet and Loud Quitters Presents New Threats

    Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats

    1. Photo of Elizabeth Harz

      Elizabeth Harz

      CEO, Veriato

  2. How Will the Cyber Pathways Impact Your Career?

    Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals

    1. Photo of Jamal Elmellas

      Jamal Elmellas

      COO, Focus on Security

  3. Time to Demand IT Security by Design and Default

    Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services

    1. Photo of Toby Sibley

      Toby Sibley

      Security Expert, PA Consulting

  4. Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework

    Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny

    1. Photo of Cédric  Burton

      Cédric Burton

      Partner, Global Co-Chair Privacy and Cybersecurity, Wilson Sonsini

    2. Photo of Tom Evans

      Tom Evans

      Senior Associate, Privacy and Cybersecurity, Wilson Sonsini

  5. How to Prepare for NIS2

    Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024

    1. Photo of Tom Venables

      Tom Venables

      Enterprise Solutions Director, Turnkey Consulting

  6. Why Businesses Ignore Incident Response at Their Peril

    Phil Robinson explores the dangers around businesses lethargy towards incident response planning

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  7. The Gender Gap is Widening in Cyber – What Can We Do About it?

    Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity

    1. Photo of Kim Wiles

      Kim Wiles

      Government Cyber Services Expert and Product Manager, Nominet

  8. It’s Time to Elevate the Humble SBOM

    Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative

    1. Photo of Pieter Danhieux

      Pieter Danhieux

      CEO & co-founder, Secure Code Warrior

  9. Navigating the Future with Generative AI: Treating AI as a Trusted Colleague

    Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool

    1. Photo of Craig Civil

      Craig Civil

      Director of Data Science and Artificial Intelligence, BSI Group

  10. Paving a Path to Security by Design Across the Industry

    SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals

    1. Photo of Tim Brown

      Tim Brown

      CISO and VP of Security, SolarWinds

  11. How to Securely Manage the Data of Vulnerable Groups

    Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  12. Why it’s Time to Kick the Password Habit

    The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      CEO, FIDO Alliance

  13. How to Ensure Cyber Resilience Across the Supply Chain

    Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks

    1. Photo of Apu Pavithran

      Apu Pavithran

      CEO and Founder, Hexnode

  14. Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?

    Mike Britton argues that the new strategy is welcome, but could go further

    1. Photo of Mike Britton

      Mike Britton

      CISO, Abnormal Security

  15. The Impact of Artificial Intelligence on Software Development

    Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development

    1. Photo of Jamie Boote

      Jamie Boote

      associate principal consultant, Synopsys

  16. HowTo: Challenge Deepfake Fraud

    Alisdair Faulkner says businesses on the front line against deepfakes need to start planning now if they want to avoid a surge in fraud losses

    1. Photo of Alisdair Faulkner

      Alisdair Faulkner

      founder and CEO, Darwinium

  17. Mythbusting Through the AI Noise in Cyber: What You Need to Know

    Matt Ellison urges organizations to avoid marketing-led decisions when considering adopting AI-based security solutions

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  18. State of the Nation: Exploring the UK Cyber Landscape

    Deryck Mitchelson says the UK is falling behind other countries when it comes to building resilience to cyber-attacks

    1. Photo of Deryck Mitchelson

      Deryck Mitchelson

      Head of Global CISOs & C-Suite Advisor, Check Point Software

  19. How to Create a Culture of Incident Reporting

    Perry Carpenter says that building a culture of incident reporting requires the commitment of leadership and other stakeholders

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  20. Cyber Resilience Act: EU Regulators Must Strike the Right Balance to Avoid Open Source Chilling Effect

    Carsten Rhod Gregersen argues that the EU must engage with developers to ensure the proposed legislation doesn't unintentionally impede their work

    1. Photo of Carsten Rhod Gregersen

      Carsten Rhod Gregersen

      CEO and Founder, Nabto

What’s hot on Infosecurity Magazine?