Infosecurity Opinions

  1. Regulations for SBOMs are Useless if You Cannot Take Action

    SBOMs must be actionable and enforceable to have a significant impact in improving software security

    1. Photo of Moshe Bar

      Moshe Bar

      co-founder and CEO, Codenotary

  2. QR Codes: A Growing Vulnerability to Cybercrimes

    NCC's Rick Crandall discusses how cyber-criminals are leveraging QR codes to launch attacks and advice for consumers to avoid becoming victims

    1. Photo of Rick Crandall

      Rick Crandall

      chairman, cyber committee, National Cybersecurity Center (NCC)

  3. The Race Against Quantum: It’s Not Too Late to be the Tortoise that Beat the Hare

    The race to defend against cyber threats brought on by quantum computing is on, and Jon France, CISO of (ISC)2, says the cyber industry must catch up

    1. Photo of Jon France

      Jon France

      CISO, ISC2

  4. #HowTo: Fight the Use of Deepfakes in ID Theft

    The ability to tell fake content from reality and how this applies to our online identities is a growing challenge amid the rise of deepfakes

    1. Photo of Victor Fredung

      Victor Fredung

      CEO, Shufti Pro

  5. #IWD2023: Learning Lessons to Boost Female Representation in Cybersecurity

    Ahead of this year's International Women’s Day, Elizabeth Barr considers women’s status within cybersecurity

    1. Photo of Elizabeth Barr

      Elizabeth Barr

      head of the Cisco Networking Academy in the UK & Ireland, Cisco

  6. What the ADPPA Could Mean for Mid-Market Businesses and Startups

    With the ADPPA legislation focusing on AI algorithms as well as data governance, it is vital businesses are prepared

    1. Photo of Mike O'Malley

      Mike O'Malley

      SVP of strategy, SenecaGlobal

  7. The Cybersecurity Hype Cycle of ChatGPT and Synthetic Media

    Many organizations will ultimately need a program to defend against this new class of threats

    1. Photo of Mike Price

      Mike Price

      CTO, ZeroFOX

  8. #HowTo: Accelerate Detection and Response in the Cloud

    Enriching network traffic data can make SecOps analysts more effective

    1. Photo of Stan Kiefer

      Stan Kiefer

      security researcher, Corelight

  9. Should we Make Ransomware Payments Illegal?

    With Australia contemplating a ban on ransomware payments, Will Dixon questions whether this will be a wise move

    1. Photo of Will Dixon

      Will Dixon

      global head of the Academy and Community, ISTARI

  10. Why Organizations Should Not Rely on the New EU US Privacy Framework in the Long-Term

    Roberts & Obradovic Law Group discuss the risks of relying on the new EU US Privacy Framework for data transfers

    1. The Roberts & Obradovic Team

      Roberts * Obradovic

  11. Cybersecurity Burnout – Human vs Machine

    Current ways of working in cybersecurity have become outdated and unsustainable, creating a volatile operational cocktail

    1. Photo of Brian Martin

      Brian Martin

      head of product, strategy and innovation, Integrity360

  12. #HowTo: Update Software Securely

    David Higgins from CyberArk highlights five best practices to follow when updating software as part of a wider defense-in-depth strategy

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  13. CISA’s Recognition of Security Control Validation is a Major Milestone

    CISA recently issued an alert advising organizations to validate security control effectiveness

    1. Photo of Dr Suleyman Ozarslan

      Dr Suleyman Ozarslan

      Co-founder, Picus Security

  14. Will CMMC 2.0 Prove a Help or Hindrance to Defense Contractors?

    The US federal government has created a simplified and more flexible version of the CMMC model, but will it have the desired impact in reality?

    1. Photo of Matthew  Hodson

      Matthew Hodson

      CIO, Valeo Networks

  15. Why Keeping Your Gaming Console Secure Should be a Priority in 2023

    With gaming cyber threats on the rise, Jasson Casey, sets out steps gamers can take to improve their online security

    1. Photo of Jasson Casey

      Jasson Casey

      chief technology officer, Beyond Identity

  16. #HowTo: Maximize Security ROI Amid an Economic Downturn

    By incorporating automation, security teams can demonstrate program value to leadership, reduce costs and bring transformational change to the business

    1. Photo of Cody Cornell

      Cody Cornell

      chief strategy officer, Swimlane

  17. Schools Out for Ransom: Education Under Attack

    Cyberis' Matt Lorentzen details the unique cybersecurity challenges facing the education sector

    1. Photo of Matt  Lorentzen

      Matt Lorentzen

      Principal Consultant, Cyberis

  18. SMBs Should Increase Cybersecurity Investment Despite the Economy

    Cyber-criminals see a recession as an opportunity to attack companies at their weakest, meaning SMBs can't afford to reduce investment in security

    1. Photo of Dror Liwer

      Dror Liwer

      co-founder, Coro

  19. The Security Challenge of Open Source Software

    A more collaborative approach to security is needed to ensure open source is secure in the future

    1. Photo of Amanda  Brock

      Amanda Brock

      CEO, OpenUK

  20. #HowTo: Protect Healthcare Providers' Data

    Pharma companies must offer robust data security and privacy in their marketing practices today

    1. Photo of Michelle Teuscher

      Michelle Teuscher

      life sciences industry principal, Treasure Data

What’s hot on Infosecurity Magazine?