Infosecurity Opinions
The Anatomy of an Insider Threat
People are an organization’s greatest insider threat risk, but they can also become an integral defense mechanism
Cybersecurity in Space: Exploring Extra-Terrestrial Vulnerabilities
Satellites provide critical services, meaning cyber-attacks can cause widespread disruption
#HowTo: Reduce Cyber Risks Amid Surging Threats
Organizations must adopt new approaches to reduce cyber-risk amid an increasingly dangerous threat landscape
The Rise of CCTV Hacks in an Evolving Cyber-Threat Landscape
Camellia Chan discusses the rise of CCTV hacks and how to guard against these threats
Taking a Different Approach to Tackle the Cyber Skills Gap
Cyber professionals continue to walk in search of higher pay and better working conditions, so what can the business do to improve retention?
#HowTo: Secure AI and its Software Supply Chains
Dan Conn discusses what needs to be done to secure AI and its software supply chains
Make Secure-by-Design Possible at University and Beyond
Amy Baker discusses how secure coding training can become integrated both in college and industry
New State-Wide Privacy Laws Could Have Unintended Consequences for Consumers and Businesses
Ev Kontsevoy argues the federal government will eventually need to step in for a lasting privacy solution
Understanding Business Resilience: There’s More to it Than Meets the Eye
Business resilience goes far beyond having watertight cybersecurity
Data Management, it’s Good for Security and the Planet
Data management is not just going to save you money, but it could also help save the planet
#HowTo: Become an Enabler for Change as a CISO
CISOs must overcome time and resource challenges to become enablers of change within their organization
Businesses Must Move Beyond the Reactive Approach to Cybersecurity
By shifting to a proactive and more strategic approach, security professionals can build a risk-aware culture in their organization