Infosecurity Opinions

  1. Decoding NIS2 to Secure Your Supply Chain

    CrowdStrike's Zeki Turedi highlights how the EU's NIS2 directive will impact UK organizations' approach to supply chain security

    1. Photo of Zeki  Turedi

      Zeki Turedi

      CTO Europe, CrowdStrike

  2. Leveraging Trust and Visibility to Comply with New EU Cyber Regulations

    Mishcon de Reya lawyers advise organizations to use innovative solutions to enhance visibility and trust in their systems amid upcoming EU cyber regulations

    1. Photo of Gavin Ferris

      Gavin Ferris

      CEO, lowRISC

    2. Photo of Anne Rose

      Anne Rose

      Managing Associate, Mishcon de Reya LLP

    3. Photo of Louise Schofield

      Louise Schofield

      Trainee Solicitor, Mishcon de Reya LLP

  3. Setting the Tone at the Top to Manage Enterprise Risk

    Businesses should establish a clear tone at the top to ensure everyone in the organization understands the significance of cybersecurity

    1. Photo of Dr Sean Costigan

      Dr Sean Costigan

      Managing Director of Resilience Strategy, Red Sift

    2. Photo of Annie Searle

      Annie Searle

      Principal

  4. The Role of Microsegmentation in Strengthening Zero Trust Security

    Venkata Nedunoori discusses the connection between microsegmentation and zero trust, and how to implement this component successfully

    1. Photo of Venkata Nedunoori

      Venkata Nedunoori

      Associate Director, Dentsu International

  5. How to Protect Against Advanced AI Scams

    PA Consulting's Paul Whitlock says traditional security controls and actions can still play a big role in protecting against advanced AI scams

    1. Photo of Paul Whitlock

      Paul Whitlock

      Cyber Security Specialist and Systems Engineer, PA Consulting

  6. Why You Must Consider the Security Risks of BYOD

    Microsoft's Alan Slothower discusses the risks posed by increasing BYOD policies in enterprises

    1. Photo of Alan Slothower

      Alan Slothower

      Head of Surface Commercial UK, Microsoft

  7. The Double-Edged Sword of Generative AI

    AI advancements eliminate traditional phishing red flags, allowing cybercriminals to create hyper-realistic attacks via deepfakes and voice notes

    1. Photo of Giovanni Cozzolino

      Giovanni Cozzolino

      UKI Security Lead, Accenture

  8. How to Build Cyber Resilience in Healthcare

    Lauren Winchester explains how healthcare organizations can exhibit strong cyber resilience

    1. Photo of Lauren Winchester

      Lauren Winchester

      SVP, Risk Advisory, Corvus Insurance

  9. AI Must Prove its Trustworthiness

    Box CISO Julien Soriano says we must turn our attention to the security and veracity of the data we are feeding into AI models

  10. How Banks Can Safeguard Customers From Romance Fraud

    Online dating's rise as the leading way to meet potential partners has created a boom in romance scams, demanding industry solutions to protect users

    1. Photo of Greg Hancell

      Greg Hancell

      Head of Fraud Prevention, Lynx

  11. Why Culture is the Bedrock of Cybersecurity

    Ken Deitz explains why culture is the guiding principle for good cyber governance

    1. Photo of Ken Deitz

      Ken Deitz

      CISO, Secureworks

  12. Three Psychological Theories to Ensure Cybersecurity Training Sticks

    Andrew Rose says leveraging behavioral psychology theories will create a much higher success rate in employee cybersecurity training programs

    1. Photo of Andrew Rose

      Andrew Rose

      CSO, SoSafe

  13. The Data Privacy Risks from Video Surveillance at the Paris Olympics

    Vishwa Narayan discusses how authorities can strike the right balance between privacy and security by using video surveillance at the Paris Olympics

    1. Photo of Vishwa Vijoyendra  Narayan

      Vishwa Vijoyendra Narayan

      Director of Product Management, Quantum

  14. How to Protect Yourself from Rising Romance Investment Scams

    Erin Fracolli sets out how online daters can detect sophisticated romance investment scams

    1. Photo of Erin Fracolli

      Erin Fracolli

      Global Head of Intelligence and Investigations, Binance

  15. Why Federal Agencies Must Learn from the Cyber Safety Review Board Report on Microsoft

    Sean Moran says the CSRB report into Microsoft shows that the US government needs to end its single-source reliance on cybersecurity contractors

    1. Photo of Sean Moran

      Sean Moran

      Former Staff Director of the House Committee on House Administration

  16. Why Banks Should be Taking Quantum Security Very Seriously

    Andersen Cheng says banks are acutely vulnerable to the threat posed by quantum computers

    1. Photo of Andersen Cheng

      Andersen Cheng

      Chairman, Post-Quantum and CEO and founder, Nomidio

  17. How to Navigate the Risks of Generative AI

    KPMG's Matthew Roach says a holistic approach is needed to ensure the safe and responsible use of generative AI

    1. Photo of Matthew Roach

      Matthew Roach

      Head of i-4 Cyber Security Leaders Community, KPMG

  18. Banning Ransomware Payments Will Do More Harm Than Good

    Ian Thornton-Trump argues that a ransomware ban would have severe unintended consequences

    1. Photo of Ian Thornton-Trump

      Ian Thornton-Trump

      CISO - Cyjax Ltd

  19. Learning from Heartbleed to Quantum-Proof the Future

    Kevin Bocek says we must learn from the Heartbleed vulnerability crisis 10 years ago to prepare for the threat posed by quantum to current encryption methods

    1. Photo of Kevin Bocek

      Kevin Bocek

      Chief Innovation Officer, Venafi

  20. Is the Human Factor Overlooked in Cybersecurity?

    LRQA's Lisa Washer explains why people, not just technology, must be at the core of cybersecurity

    1. Photo of Lisa  Washer

      Lisa Washer

      Global Head of Defensive Security Services, LRQA

What’s hot on Infosecurity Magazine?