Infosecurity Opinions
#CyberMonth: Strengthening Cybersecurity Resilience by Going Beyond Blame
Steve Forbes says human intelligence will be indispensable in the battle against AI-based phishing attacks
3 Things CISOs Should Be Doing This Cybersecurity Awareness Month and Beyond
Cybersecurity Awareness Month is a pivotal time to assess your enterprise's cybersecurity posture beyond the basics of multi-factor authentication, strong passwords, and up-to-date software
Preserving Digital Trust in an Era of Rapidly Evolving Threats
Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats
Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout
Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats
Responsible Cyber Operations: From Theory to Reality
Nick Beecroft discusses how to create a doctrine for being a responsible cyber power
Are Tabletop Exercises Still Relevant for Modern Cybersecurity?
Dotan Nahum sets out how to make the most of tabletop exercises in 2023 and beyond
How the Rise of Deepfakes Will Impact the 2024 Presidential Elections
Blair Cohen says it is time to harness AI’s power to minimize the impact deepfakes could have on the democratic process
#CyberMonth: Why Boardrooms Need a Stronger CISO Influence
Tony Buffomante discusses how to break the ice between cyber experts and board members
Challenging Old Ideas: The Ongoing Need to Empower Women in Tech
Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce
#CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be
Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution
#CyberMonth: Six Steps to Build a Positive Security Culture
Fred Kwong says effective security culture requires commitment from the top down
How to Comply with API Security Requirements in PCI DSS Version 4.0
Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards