Infosecurity Opinions

  1. #HowTo: Limit the Impact of Data Breaches

    Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  2. Understanding the Growing Professionalism of Cyber-Criminals

    Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack

    1. Photo of Melissa Bischoping

      Melissa Bischoping

      Director of Endpoint Security Research, Tanium

  3. Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention

    Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  4. #HowTo: Protect Organizations Against ChatGPT Cyber-Threats

    Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats

    1. Photo of Jesper Trolle

      Jesper Trolle

      CEO, Exclusive Networks

  5. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  6. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  7. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

  8. Padding Users’ Defenses Against ChatGPT

    FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  9. #HowTo: Create and Maintain SBOMs

    Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  10. Why Apps Like TikTok Can Be a Security Issue for Your Business

    Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment

    1. Photo of Frank Johnson

      Frank Johnson

      vice president of US Federal, Lookout Inc

  11. The Open-Source Software in Our Pockets Needs Our Help

    Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb

    1. Photo of Jacobo McGuire

      Jacobo McGuire

      policy research intern, Chainguard

    2. Photo of John Speed Meyers

      John Speed Meyers

      principal security scientist, Chainguard

  12. #HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises

    Jim Nitterauer argues that by thinking outside the box, MSEs can manage risk with less staff, limited security tools and smaller budgets

    1. Photo of Jim Nitterauer

      Jim Nitterauer

      director, information security, Graylog

What’s hot on Infosecurity Magazine?