Infosecurity Opinions

  1. Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

    Rising attacks targeting the gaming sector are undermining consumer trust and decreasing sales

    1. Photo of Andrew Whaley

      Andrew Whaley

      senior technical director, Promon

  2. Insider Threats in the Work from Home Age

    Christos Flessas explains why the shift to remote work has increased insider threat risks to organizations

    1. Photo of Christos Flessas

      Christos Flessas

      Communications and Information Systems Engineer, Hellenic Air Force

  3. Why the UK Government Must End its Senseless Encryption Demands

    Will UK government plans to ban end-to-end encryption in messaging services damage consumers' privacy and security?

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  4. #HowTo: Improve Your Cyber Resilience

    SecurityScorecard's Alexander Heid sets out four steps to improve your organization's cyber resilience

    1. Photo of Alexander Heid

      Alexander Heid

      chief research and development officer, SecurityScorecard

  5. Navigating AI Job Losses: Balancing Progress and Social Responsibility

    Nikki Webb explores the ethical implications of job losses due to AI, with a focus on the personal impact on individuals

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  6. ChatGPT: Not All Gloom and Doom for Security Professionals

    Chris Jacobs urges the security community to stop focusing solely on the risks of ChatGPT, and start looking at the potential gains

    1. Photo of Chris Jacob

      Chris Jacob

      global vice president, threat intelligence engineers, ThreatQuotient

  7. GDPR Fines: Are They Working?

    While regulators could increase fines for breaching the GDPR, ultimately, it will be the public that makes big tech take notice, says Alison Berryman

    1. Photo of Alison Berryman

      Alison Berryman

      senior managing lawyer, Biztech Lawyers

  8. Understanding Theories and Biases to Better Inform Security Decisions

    Keavy Murphy says security leaders should leverage theories that impact every business unit to demonstrate the impact of a data breach

    1. Photo of Keavy Murphy

      Keavy Murphy

      Senior Director of Security, Starburst Data

  9. ChatGPT Can Be Used to Create Malware: Here’s How

    The malicious use of ChatGPT’s API within malware can present significant challenges for security professionals

    1. Photo of Eran Shimony

      Eran Shimony

      Principal Cyber Researcher, CyberArk

  10. #HowTo: Improve Your Website Security

    David Strauss highlights areas to focus on to improve security approaches in WebOps

    1. Photo of David Strauss

      David Strauss

      CTO and co-founder, Pantheon

  11. Why Trust and Evidence Are the New Frontiers of Open-Source Risk

    Brian Dye says we must open our eyes to the risks of open-source software without limiting its huge business benefits

    1. Photo of Brian Dye

      Brian Dye

      CEO, Corelight

  12. Understanding the Role of CISOs, CTOs and CIOs in Cybersecurity

    The roles of security leaders have undergone drastic changes in recent years

    1. Photo of Jessica  Perkins

      Jessica Perkins

      SaaS Marketing Consultant & Writer

What’s hot on Infosecurity Magazine?