Infosecurity Opinions
How to Tackle Deepfakes and Manipulation
Jessica Perkins sets out steps individuals can take to combat the risks posed by deepfakes
Cybersecurity Compliance Confidence: The New Competitive Advantage for Enterprises
Igor Volovich says its time for a paradigm shift in compliance strategies
Pandemic Development Risks Non-Compliance with White House Guidelines
Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy
How To Prevent Ransomware Attackers Striking Again
Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring
Reviewing the UK Government Call for Views on Supply Chain Threats
Michael Smith says that open dialogue is the first step to improving supply chain security
Generative AI: Friend or Foe?
Joe Partlow assesses the security threats and benefits of generative AI
NATO Countries Must Work Together to Counter the Russian Cyber-Threat
William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like
How To Create an Effective Patch Management Program
Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs
How Has GDPR Changed Our Approach to Data Protection?
Prof Kevin Curran discusses how the GDPR has changed organizations' security practices
How AI Will Change Red Teaming
Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers
Achieving Cyber Resilience in Undersea Cable Networks
Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables
#HowTo: Limit the Impact of Data Breaches
Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents