Infosecurity Opinions

  1. Why Trust and Evidence Are the New Frontiers of Open-Source Risk

    Brian Dye says we must open our eyes to the risks of open-source software without limiting its huge business benefits

    1. Photo of Brian Dye

      Brian Dye

      CEO, Corelight

  2. Understanding the Role of CISOs, CTOs and CIOs in Cybersecurity

    The roles of security leaders have undergone drastic changes in recent years

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

  3. Don’t Insure Against Cyber-Risk, Protect Against It

    BSI's Mark Brown argues that Lloyd's decision to exclude systemic cyber risk from coverage offers an opportunity for organizations to become more resilient

    1. Photo of Mark Brown

      Mark Brown

      global managing director, BSI Group

  4. #HowTo: Demand More from MSSPs

    Richard Hollis suggests 10 questions organizations should ask their MSSPs

    1. Photo of Richard Hollis

      Richard Hollis

      CEO, Risk Crew

  5. Mother’s Day Scams: Targeted Attacks on the Rise

    Raj Dasgupta highlights scams for Americans to look out for while purchasing Mother's Day gifts

    1. Photo of Raj Dasgupta

      Raj Dasgupta

      senior director, global advisory, BioCatch

  6. The Evolving Nature of Cybersecurity Careers: How to Stay Ahead of the Curve

    EC Council's Jay Bavisi outlines how the opportunities and skillsets are evolving in cybersecurity

    1. Photo of Jay  Bavisi

      Jay Bavisi

      CEO & President, EC-Council

  7. What Financial Executives Need to Know and Ask About Cybersecurity

    Cameron Over highlights how cybersecurity can be demystified for CFOs

    1. Photo of Cameron Over

      Cameron Over

      partner and cybersecurity lead, CrossCountry Consulting

  8. #HowTo: Mitigate Burnout for Cybersecurity Staff

    Julien Soriano explains why minimizing burnout in cyber professionals is so crucial to organizations' security

  9. A Decade On – What’s Happened to Crowdsourced Security?

    Alex Haynes reflects the impact of crowdsourced security on the cyber industry so far

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  10. Mayday, Mayday our Network is Going Down

    How cybersecurity can learn lessons from aviation’s response to serious incidents

    1. Photo of Lisa Forte

      Lisa Forte

      Partner, Red Goat Cyber Security

  11. The Real Threats and Opportunities of ChatGPT

    There's been a lack of focus on the huge security benefits of ChatGPT, says Cequence's Jason Kent

    1. Photo of Jason Kent

      Jason Kent

      Hacker In Residence, Cequence Security

  12. Why European Space Cybersecurity Matters

    We have an unprecedented opportunity to create a secure ecosystem to protect the critical space sector, says CYSAT's Mathieu Bailly

    1. Photo of Mathieu Bailly

      Mathieu Bailly

      VP Space, Cysec; Director of CYSAT

  13. Pulling Back the Curtain to Address TikTok Security Concerns

    People are key to the success of any cybersecurity plan around TikTok, says ThreatBlockr's Pat McGarry

    1. Photo of Pat McGarry

      Pat McGarry

      CTO, ThreatBlockr

  14. HowTo: Protect Software by Understanding Your Environment

    Software is a big target for cyber-criminals, and organizations must understand their environment to secure it

    1. Photo of Girish Janardhanudu

      Girish Janardhanudu

      vice president, security consulting, Synopsys

  15. Data Security Best-Practice in a World of Evolving Risks and Regulations

    Organizations with a uniform approach to data management and access control can increase their security and compliance

    1. Photo of Sophie Stalla-Bourdillon

      Sophie Stalla-Bourdillon

      senior privacy counsel and legal engineer, Immuta

  16. How Website Tracking Technologies Are Transforming Risk Analysis Across Industries

    The potential for class action lawsuits and regulatory investigations is growing, meaning organizations must have conversations about tracking technology

    1. Photo of Lauren Winchester

      Lauren Winchester

      SVP, Risk Advisory, Corvus Insurance

  17. #HowTo: Reduce Risk and Complexity in Cloud Networks

    John Moran discusses how security to move from inhibitor to enabler to organizations multi-cloud strategies

    1. Photo of John Moran

      John Moran

      Technical Director, Business Development, Tufin

  18. Why Security Pros Need to Escape the Cyber Bubble

    The cybersecurity community agrees on so much, but why do we still argue over the same things?

    1. Photo of Mike Thompson

      Mike Thompson

      Information Security Manager - Zen Internet

  19. The Anatomy of an Insider Threat

    People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism

    1. Photo of Tim De Sousa

      Tim De Sousa

      Senior Director, FTI Consulting

    2. Photo of Kevin Hughes

      Kevin Hughes

      Senior Director, FTI Consulting

  20. Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities

    Satellites provide critical services, meaning cyber-attacks can cause widespread disruption

    1. Photo of Douglas McKee

      Douglas McKee

      principal engineer & director of vulnerability research, Trellix

What’s hot on Infosecurity Magazine?