Infosecurity Opinions

  1. How to Protect Yourself from Rising Romance Investment Scams

    Erin Fracolli sets out how online daters can detect sophisticated romance investment scams

    1. Photo of Erin Fracolli

      Erin Fracolli

      Global Head of Intelligence and Investigations, Binance

  2. Why Federal Agencies Must Learn from the Cyber Safety Review Board Report on Microsoft

    Sean Moran says the CSRB report into Microsoft shows that the US government needs to end its single-source reliance on cybersecurity contractors

    1. Photo of Sean Moran

      Sean Moran

      Former Staff Director of the House Committee on House Administration

  3. Why Banks Should be Taking Quantum Security Very Seriously

    Andersen Cheng says banks are acutely vulnerable to the threat posed by quantum computers

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  4. How to Navigate the Risks of Generative AI

    KPMG's Matthew Roach says a holistic approach is needed to ensure the safe and responsible use of generative AI

    1. Photo of Matthew Roach

      Matthew Roach

      Head of i-4 Cyber Security Leaders Community, KPMG

  5. Banning Ransomware Payments Will Do More Harm Than Good

    Ian Thornton-Trump argues that a ransomware ban would have severe unintended consequences

    1. Photo of Ian Thornton-Trump

      Ian Thornton-Trump

      CISO - Cyjax Ltd

  6. Learning from Heartbleed to Quantum-Proof the Future

    Kevin Bocek says we must learn from the Heartbleed vulnerability crisis 10 years ago to prepare for the threat posed by quantum to current encryption methods

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi

  7. Is the Human Factor Overlooked in Cybersecurity?

    LRQA's Lisa Washer explains why people, not just technology, must be at the core of cybersecurity

    1. Photo of Lisa  Washer

      Lisa Washer

      Global Head of Defensive Security Services, LRQA

  8. Why Voice Authentication Should Not Be Used to Secure Critical Assets

    Alex Haynes highlights a case study involving the use of voice authentication for HSBC, which shows the security flaws of this method

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  9. Why DDoS Threat Actors Are Shifting Their Tactics

    With the changes in DDoS attack size, diversity, and the development of new methods, organizations must not become complacent

    1. Photo of Donny Chong

      Donny Chong

      Director, Nexusguard

  10. Enhancing Collaboration: Incident Response Teams and Law Enforcement

    As cyber-attacks surge, fostering collaboration between Incident Response Teams and law enforcement is crucial to fortify defenses and respond effectively

    1. Photo of Chris Gibson

      Chris Gibson

      Executive Director, FIRST

  11. Overcoming the AI Privacy Predicament

    The IAPP's Müge Fazlioglu says organizations must address consumers' privacy concerns to realize the full potential of AI

    1. Photo of Müge  Fazlioglu

      Müge Fazlioglu

      Principal Researcher for Privacy Law & Policy, International Association of Privacy Professionals (IAPP)

  12. Learning from File Transfer Software Vendors’ Vulnerability Response

    Rapid7's Caitlin Condon explains why organizations could learn from file transfer vendors' response to high-severity vulnerabilities coming to light

    1. Photo of Caitlin Condon

      Caitlin Condon

      Director of Vulnerability Intelligence, Rapid7

  13. Rethinking Open-Source Intelligence for Security in Commercial Settings

    Jonathan Couch expects OSINT capabilities to be integrated into network security within the private sector in the next few years

    1. Photo of Jonathan Couch

      Jonathan Couch

      COO, ShadowDragon

  14. Four Steps to Cultivating a Cyber Resilient Workforce

    Businesses must address the cyber security training gap to combat rising attacks, this must be a joint effort through solutions, policies, and employee training is key

    1. Photo of Michael Armer

      Michael Armer

      CISO, RingCentral

  15. Resisting Hindsight Bias: A Proposed Framework for CISO Liability

    Debevoise & Plimpton proposes criteria for evaluating whether to charge CISOs for violations of federal security laws

    1. Photo of Luke Dembosky

      Luke Dembosky

      Partner and Co-Chair of Data Strategy & Security, Debevoise & Plimpton LLP

    2. Photo of Anna Moody

      Anna Moody

      Counsel, Debevoise & Plimpton LLP

    3. Photo of Julie M. Riewe

      Julie M. Riewe

      Partner, Debevoise & Plimpton LLP

  16. How to Bridge the Cyber Talent Gap

    Deloitte's Stephen Wray says the explosion of AI technology must be the catalyst for bridging the cyber skills gap

    1. Photo of Stephen Wray

      Stephen Wray

      Lead Cyber Partner for Government and Public Services, Deloitte UK

  17. Data Privacy Day: Data Privacy Enforcement Changes Impacting Businesses in 2024

    Legal experts detail changes to data privacy enforcement globally this year, and how this will impact businesses

    1. Photo of Robert Barton

      Robert Barton

      Associate, Freshfields

    2. Photo of Timothy Howard

      Timothy Howard

      Partner and US Head of Data Security, Freshfields

  18. Data Privacy Week: Can Businesses Navigate the PII Labyrinth in the Age of Cyber Threats?

    With stricter regulations and evolving threats, organizations must re-evaluate how they collect, store, and manage customer data

    1. Photo of Petra Tesch

      Petra Tesch

      Chief Information Officer, Vizrt

  19. Data Privacy Week: Navigating Data Privacy in the Age of AI

    Lawyers from Hanson Bridgett say there must be a commitment to responsible AI practices to navigate the changing data regulation landscape

    1. Photo of Jenny  Dao

      Jenny Dao

      Associate, Hanson Bridgett

    2. Photo of Batya Forsyth

      Batya Forsyth

      Partner, Hanson Bridgett

    3. Photo of Rob McFarlane

      Rob McFarlane

      Partner, Hanson Bridgett

  20. Data Privacy Week: Will the US Adopt a Federal Data Privacy Law in 2024?

    Vishal Gupta asks whether the US will take meaningful steps towards data privacy legislation this year

    1. Photo of Vishal Gupta

      Vishal Gupta

      CEO & Co-Founder, Seclore

What’s hot on Infosecurity Magazine?