Infosecurity Opinions

  1. #HowTo: Be Proactive in Your Incident Response Planning

    Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off

    1. Photo of Larry Gagnon

      Larry Gagnon

      senior vice president, security services and incident response, eSentire

  2. #InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks

    CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models

    1. Photo of Dr Sven Krasser

      Dr Sven Krasser

      senior vice president and chief scientist, CrowdStrike

  3. What Are the Ramifications of the Meta GDPR fine for UK Businesses?

    Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world

    1. Photo of Alasdair Anderson

      Alasdair Anderson

      VP, strategy, Protegrity

  4. Padding Users’ Defenses Against ChatGPT

    FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT

    1. Photo of Andrew Shikiar

      Andrew Shikiar

      executive director & CMO, FIDO Alliance

  5. #HowTo: Create and Maintain SBOMs

    Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive

    1. Photo of Eilon Elhadad

      Eilon Elhadad

      senior director, supply chain security, Aqua Security

  6. Why Apps Like TikTok Can Be a Security Issue for Your Business

    Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment

    1. Photo of Frank Johnson

      Frank Johnson

      vice president of US Federal, Lookout

  7. The Open-Source Software in Our Pockets Needs Our Help

    Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb

    1. Photo of Jacobo McGuire

      Jacobo McGuire

      policy research intern, Chainguard

    2. Photo of John Speed Meyers

      John Speed Meyers

      principal security scientist, Chainguard

  8. #HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises

    Jim Nitterauer argues that by thinking outside the box, MSEs can manage risk with less staff, limited security tools and smaller budgets

    1. Photo of Jim Nitterauer

      Jim Nitterauer

      director, information security, Graylog, Inc.

  9. Hackers, Fraudsters and Thieves: Understanding Cybersecurity in the Gaming Industry

    Rising attacks targeting the gaming sector are undermining consumer trust and decreasing sales

    1. Photo of Andrew Whaley

      Andrew Whaley

      senior technical director, Promon

  10. Insider Threats in the Work from Home Age

    Christos Flessas explains why the shift to remote work has increased insider threat risks to organizations

    1. Photo of Christos Flessas

      Christos Flessas

      Communications and Information Systems Engineer, Hellenic Air Force

  11. Why the UK Government Must End its Senseless Encryption Demands

    Will UK government plans to ban end-to-end encryption in messaging services damage consumers' privacy and security?

    1. Photo of Matt Ellison

      Matt Ellison

      director, sales engineering, EMEA, Corelight

  12. #HowTo: Improve Your Cyber Resilience

    SecurityScorecard's Alexander Heid sets out four steps to improve your organization's cyber resilience

    1. Photo of Alexander Heid

      Alexander Heid

      chief research and development officer, SecurityScorecard

What’s hot on Infosecurity Magazine?