Infosecurity Opinions

  1. #HowTo: Prevent Ransomware Attackers Striking Again

    Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring

    1. Photo of Charles Smith

      Charles Smith

      Consulting Solutions Engineer, Data Protection, Barracuda

  2. Reviewing the UK Government Call for Views on Supply Chain Threats

    Michael Smith says that open dialogue is the first step to improving supply chain security

    1. Photo of Michael Smith

      Michael Smith

      Field CTO, Vercara

  3. Generative AI: Friend or Foe?

    Joe Partlow assesses the security threats and benefits of generative AI

    1. Photo of Joe Partlow

      Joe Partlow

      Chief Technology Officer, ReliaQuest

  4. NATO Countries Must Work Together to Counter the Russian Cyber-Threat

    William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like

    1. Photo of William Hutchison

      William Hutchison

      CEO, SimSpace

  5. #HowTo: Create an Effective Patch Management Program

    Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs

    1. Photo of Zoe Rose

      Zoe Rose

      Regional and Supplier Information Security Lead, Canon Europe

  6. How Has GDPR Changed Our Approach to Data Protection?

    Prof Kevin Curran discusses how the GDPR has changed organizations' security practices

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

  7. How AI Will Change Red Teaming

    Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers

    1. Photo of Phil Robinson

      Phil Robinson

      principal security consultant and founder, Prism Infosec

  8. Achieving Cyber Resilience in Undersea Cable Networks

    Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables

    1. Photo of Chris Moore

      Chris Moore

      VP Defence & Security and CISO, OneWeb

  9. #HowTo: Limit the Impact of Data Breaches

    Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents

    1. Photo of Ben Herzberg

      Ben Herzberg

      chief scientist, Satori

  10. Understanding the Growing Professionalism of Cyber-Criminals

    Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack

    1. Photo of Melissa Bischoping

      Melissa Bischoping

      Director of Endpoint Security Research, Tanium

  11. Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention

    Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind

    1. Photo of Russell Howe

      Russell Howe

      VP EMEA, Ketch

  12. #HowTo: Protect Organizations Against ChatGPT Cyber-Threats

    Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats

    1. Photo of Jesper Trolle

      Jesper Trolle

      CEO, Exclusive Networks

What’s hot on Infosecurity Magazine?