Infosecurity Opinions

  1. GDPR Fines: Are They Working?

    While regulators could increase fines for breaching the GDPR, ultimately, it will be the public that makes big tech take notice, says Alison Berryman

    1. Photo of Alison Berryman

      Alison Berryman

      senior managing lawyer, Biztech Lawyers

  2. Understanding Theories and Biases to Better Inform Security Decisions

    Keavy Murphy says security leaders should leverage theories that impact every business unit to demonstrate the impact of a data breach

    1. Photo of Keavy Murphy

      Keavy Murphy

      Senior Director of Security, Starburst Data

  3. ChatGPT Can Be Used to Create Malware: Here’s How

    The malicious use of ChatGPT’s API within malware can present significant challenges for security professionals

    1. Photo of Eran Shimony

      Eran Shimony

      Principal Cyber Researcher, CyberArk

  4. #HowTo: Improve Your Website Security

    David Strauss highlights areas to focus on to improve security approaches in WebOps

    1. Photo of David Strauss

      David Strauss

      CTO and co-founder, Pantheon

  5. Why Trust and Evidence Are the New Frontiers of Open-Source Risk

    Brian Dye says we must open our eyes to the risks of open-source software without limiting its huge business benefits

    1. Photo of Brian Dye

      Brian Dye

      CEO, Corelight

  6. Understanding the Role of CISOs, CTOs and CIOs in Cybersecurity

    The roles of security leaders have undergone drastic changes in recent years

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  7. Don’t Insure Against Cyber-Risk, Protect Against It

    BSI's Mark Brown argues that Lloyd's decision to exclude systemic cyber risk from coverage offers an opportunity for organizations to become more resilient

    1. Photo of Mark Brown

      Mark Brown

      global managing director, BSI Group

  8. #HowTo: Demand More from MSSPs

    Richard Hollis suggests 10 questions organizations should ask their MSSPs

    1. Photo of Richard Hollis

      Richard Hollis

      CEO, Risk Crew

  9. Mother’s Day Scams: Targeted Attacks on the Rise

    Raj Dasgupta highlights scams for Americans to look out for while purchasing Mother's Day gifts

    1. Photo of Raj Dasgupta

      Raj Dasgupta

      senior director, global advisory, BioCatch

  10. The Evolving Nature of Cybersecurity Careers: How to Stay Ahead of the Curve

    EC Council's Jay Bavisi outlines how the opportunities and skillsets are evolving in cybersecurity

    1. Photo of Jay  Bavisi

      Jay Bavisi

      CEO & President, EC-Council

  11. What Financial Executives Need to Know and Ask About Cybersecurity

    Cameron Over highlights how cybersecurity can be demystified for CFOs

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  12. #HowTo: Mitigate Burnout for Cybersecurity Staff

    Julien Soriano explains why minimizing burnout in cyber professionals is so crucial to organizations' security

  13. A Decade On – What’s Happened to Crowdsourced Security?

    Alex Haynes reflects the impact of crowdsourced security on the cyber industry so far

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  14. Mayday, Mayday our Network is Going Down

    How cybersecurity can learn lessons from aviation’s response to serious incidents

    1. Photo of Lisa Forte

      Lisa Forte

      Partner, Red Goat Cyber Security

  15. The Real Threats and Opportunities of ChatGPT

    There's been a lack of focus on the huge security benefits of ChatGPT, says Cequence's Jason Kent

    1. Photo of Jason Kent

      Jason Kent

      Hacker In Residence, Cequence Security

  16. Why European Space Cybersecurity Matters

    We have an unprecedented opportunity to create a secure ecosystem to protect the critical space sector, says CYSAT's Mathieu Bailly

    1. Photo of Mathieu Bailly

      Mathieu Bailly

      VP Space, Cysec; Director of CYSAT

  17. Pulling Back the Curtain to Address TikTok Security Concerns

    People are key to the success of any cybersecurity plan around TikTok, says ThreatBlockr's Pat McGarry

    1. Photo of Pat McGarry

      Pat McGarry

      CTO, ThreatBlockr

  18. HowTo: Protect Software by Understanding Your Environment

    Software is a big target for cyber-criminals, and organizations must understand their environment to secure it

    1. Photo of Girish Janardhanudu

      Girish Janardhanudu

      vice president, security consulting, Synopsys

  19. Data Security Best-Practice in a World of Evolving Risks and Regulations

    Organizations with a uniform approach to data management and access control can increase their security and compliance

    1. Photo of Sophie Stalla-Bourdillon

      Sophie Stalla-Bourdillon

      senior privacy counsel and legal engineer, Immuta

  20. How Website Tracking Technologies Are Transforming Risk Analysis Across Industries

    The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology

    1. Photo of Lauren Winchester

      Lauren Winchester

      SVP, Risk Advisory, Corvus Insurance

What’s hot on Infosecurity Magazine?