Infosecurity Opinions

  1. Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership

    CISOs face unprecedented and unbearable pressures in the UK, but hope is not lost, as Ben Nelson, CISO at global analytics software leader FICO explains

    1. Photo of Ben  Nelson

      Ben Nelson

      CISO, FICO

  2. Why ‘AI-Powered’ Cyber-Attacks Are Not a Serious Threat …Yet

    AI is reshaping cybersecurity, but its offensive power is often overstated. Learn why security teams should focus on real, proven threats

    1. Photo of David Sancho

      David Sancho

      Senior Threat Researcher, Trend Micro

  3. Our Industries Are Vulnerable to Cyber-Attacks: Boardrooms Must Prioritize Resilience, Not Reaction

    AI-powered cyberattacks are escalating, leaving UK businesses vulnerable. With 88% lacking maturity to defend against threats, industries like finance, retail, and infrastructure face rising risks. Discover why resilience is critical in the age of AI-driven cybercrime

    1. Photo of Kamran Ikram

      Kamran Ikram

      Cybersecurity Lead, UK, Ireland and Africa, Accenture

  4. Regulating AI: Where Should the Line Be Drawn?

    John Eccleshare, Head of Information Security at bet365, explores why regulating AI’s use (not its development), is key to ensuring both progress and protection.

    1. Photo of John  Eccleshare

      John Eccleshare

      Head of Information Security, bet365

  5. I Negotiated Ransomware Incidents Across 15 Countries: Three Things You Must Know

    CISO Ensar Seker shares key lessons from negotiating 40+ ransomware cases across 15 countries and what every leader must know before a cyber crisis

    1. Photo of Ensar  Seker

      Ensar Seker

      CISO, SOCRadar

  6. How the Tech Industry Got Identity Wrong

    Teleport CEO Ev Kontsevoy explains why identity management is broken and why it takes 11 hours to resolve a single breach

    1. Photo of Ev Kontsevoy

      Ev Kontsevoy

      CEO and Co-Founder, Teleport

  7. The Hidden Risks of Third-Party IoT Devices: What Organizations Need to Know

    Snahil Singh and Anoop Nadig say security teams must prioritize tackling the growing risks of third-party IoT devices

    1. Photo of Anoop Nadig

      Anoop Nadig

      Senior Security Engineer

    2. Photo of Snahil Singh

      Snahil Singh

      Senior Security Engineer

  8. How to Keep Ourselves Safe from AI as it Evolves

    Professor Gaven Smith says human centered interventions are required to mitigate AI risks such as bias, surveillance and misinformation

    1. Photo of Professor Gaven Smith

      Professor Gaven Smith

      former CTO at GCHQ; Chair in Cyber Security, University of Manchester

  9. Escaping the Detection Trap: Is EDR Giving You a False Sense of Security?

    Traditional EDR tools are falling short as modern threats evolve. This article explores how fast-moving adversaries are exploiting defender tools, creating a false sense of security and overwhelming security teams

    1. Photo of Nicholas DiCola

      Nicholas DiCola

      VP of Customers, Zero Networks

  10. The CISO's Crucible – Finding Strength in Control

    Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles

    1. Photo of Peter Gooch

      Peter Gooch

      Cyber Security Partner, Deloitte

  11. Private Sector Must Shore up UK’s Cyber Defense

    SCC's Chris McGrath argues that siloed UK government structures requires a coordinated private sector-enabled solution to protect businesses and critical services

    1. Photo of Chris McGrath

      Chris McGrath

      Director of Digital Trust, SCC

  12. How Security Teams Can Manage Agentic AI Risks

    Gitlab's Josh Lemos argues organizations must develop new approaches to identity management, network security, and data protection to mitigate risks to AI agents

    1. Photo of Josh Lemos

      Josh Lemos

      CISO, GitLab

  13. NIS2 and DORA explained: What Every Business Leader Needs to Know

    ISACA's Chris Dimitriadis argues that compliance with NIS2 and DORA has become a market enabler for businesses

    1. Photo of Chris Dimitriadis

      Chris Dimitriadis

      Chief Global Strategy Officer, ISACA

  14. Beyond the Score: Rethinking Vulnerability Management in a Contextual Era

    Action1's Gene Moody argues that managing vulnerabilities goes far beyond chasing high CVSS scores

    1. Photo of Gene Moody

      Gene Moody

      Field CTO, Action1

  15. Vibe Coding: Managing the Strategic Security Risks of AI-Accelerated Development

    Murali Sastry says vibe coding is the future, but only for those prepared to manage its security risks

    1. Photo of Murali Sastry

      Murali Sastry

      Chief Technology Officer, Skillsoft

  16. The Evolving Role of the CISO: From Security Experts to Strategic Communicators

    FGS Global's Kirsti Hastings says CISOs must strengthen communications skills to be resilient to the next cyber event

    1. Photo of Kirsti Hastings

      Kirsti Hastings

      Partner, FGS Global

  17. In Conversation: Learnings for CISOs Post Black Hat and DEF CON

    OpenSSF's Christopher “CRob” Robinson discusses highlights open source discussions around AI security, SBOM adoption and government support

    1. Photo of Christopher Robinson

      Christopher Robinson

      Chief Security Architect, Open Software Security Foundation

  18. Staying Silent After a Breach Isn’t Caution, it’s Complicity

    Bitdefender’s Nicholas Jackson argues that the consequences of staying silent after a breach are far worse than the perceived benefits

    1. Photo of Nicholas Jackson

      Nicholas Jackson

      Director of Cybersecurity Services, Bitdefender

  19. The Costs of Toxic Data – And How to Avoid Them

    FTI's Deana Uhl reveals how organizations can find toxic data and what do with it once it’s been uncovered

    1. Photo of Deana Uhl

      Deana Uhl

      Managing Director, FTI Technology

  20. Winning the AI Arms Race in Financial Services Cybersecurity

    Broadridge CISO David Ramirez warns that financial services will need to leverage AI to stay ahead of sophisticated threat actors

    1. Photo of David Ramirez

      David Ramirez

      CISO, Broadridge

What’s Hot on Infosecurity Magazine?