Infosecurity Opinions

  1. The CISO's Crucible – Finding Strength in Control

    Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles

    1. Photo of Peter Gooch

      Peter Gooch

      Cyber Security Partner, Deloitte

  2. Private Sector Must Shore up UK’s Cyber Defense

    SCC's Chris McGrath argues that siloed UK government structures requires a coordinated private sector-enabled solution to protect businesses and critical services

    1. Photo of Chris McGrath

      Chris McGrath

      Director of Digital Trust, SCC

  3. How Security Teams Can Manage Agentic AI Risks

    Gitlab's Josh Lemos argues organizations must develop new approaches to identity management, network security, and data protection to mitigate risks to AI agents

    1. Photo of Josh Lemos

      Josh Lemos

      CISO, GitLab

  4. NIS2 and DORA explained: What Every Business Leader Needs to Know

    ISACA's Chris Dimitriadis argues that compliance with NIS2 and DORA has become a market enabler for businesses

    1. Photo of Chris Dimitriadis

      Chris Dimitriadis

      Chief Global Strategy Officer, ISACA

  5. Beyond the Score: Rethinking Vulnerability Management in a Contextual Era

    Action1's Gene Moody argues that managing vulnerabilities goes far beyond chasing high CVSS scores

    1. Photo of Gene Moody

      Gene Moody

      Field CTO, Action1

  6. Vibe Coding: Managing the Strategic Security Risks of AI-Accelerated Development

    Murali Sastry says vibe coding is the future, but only for those prepared to manage its security risks

    1. Photo of Murali Sastry

      Murali Sastry

      Chief Technology Officer, Skillsoft

  7. The Evolving Role of the CISO: From Security Experts to Strategic Communicators

    FGS Global's Kirsti Hastings says CISOs must strengthen communications skills to be resilient to the next cyber event

    1. Photo of Kirsti Hastings

      Kirsti Hastings

      Partner, FGS Global

  8. In Conversation: Learnings for CISOs Post Black Hat and DEF CON

    OpenSSF's Christopher “CRob” Robinson discusses highlights open source discussions around AI security, SBOM adoption and government support

    1. Photo of Christopher Robinson

      Christopher Robinson

      Chief Security Architect, Open Software Security Foundation

  9. Staying Silent After a Breach Isn’t Caution, it’s Complicity

    Bitdefender’s Nicholas Jackson argues that the consequences of staying silent after a breach are far worse than the perceived benefits

    1. Photo of Nicholas Jackson

      Nicholas Jackson

      Director of Cybersecurity Services, Bitdefender

  10. The Costs of Toxic Data – And How to Avoid Them

    FTI's Deana Uhl reveals how organizations can find toxic data and what do with it once it’s been uncovered

    1. Photo of Deana Uhl

      Deana Uhl

      Managing Director, FTI Technology

  11. Winning the AI Arms Race in Financial Services Cybersecurity

    Broadridge CISO David Ramirez warns that financial services will need to leverage AI to stay ahead of sophisticated threat actors

    1. Photo of David Ramirez

      David Ramirez

      CISO, Broadridge

  12. The Quantum Countdown: Preparing Today for Tomorrow’s Encryption Crisis

    Security leaders must ensure the board is aware that the quantum risk isn't theoretical, it's happening now

    1. Photo of Aparna Achanta

      Aparna Achanta

      Security Architect & Leader, IBM Consulting

    2. Photo of Tarnveer  Singh

      Tarnveer Singh

      CISO, The Exeter

  13. How to Understand and Adapt to Modern Cyber Threats

    Darren Guccione warns that conventional cybersecurity is ineffective against a modern attacker

    1. Photo of Darren Guccione

      Darren Guccione

      Chief Executive Officer and Co-Founder, Keeper Security

  14. Building a New Generation of Security Talent Amid an Escalating Cyber Crisis

    DeVry University's Elise Awwad urges coordinated action to train new cyber professionals

    1. Photo of Elise Awwad

      Elise Awwad

      President & Chief Executive Officer, DeVry University

  15. How to Secure the UK’s Quantum Economy

    BT’s Gabriela Styf Sjöman explains how the UK can lay secure foundations for the future implementation of quantum technologies

    1. Photo of Gabriela Styf Sjöman

      Gabriela Styf Sjöman

      Managing Director, Research and Network Strategy, BT

  16. CMMC Compliance: Far More Than Just an IT Issue

    With enforcement tightening around CMMC rules, LRQA's Brian Rhodes says US defense contractors must undertake a full-scale organizational transformation to ensure compliance

    1. Photo of Brian Rhodes

      Brian Rhodes

      Head of CMMC, Americas, LRQA

  17. The Corporate Deepfake Invasion: Safeguarding Enterprises in the AI Era

    Daryl Huff says businesses must fight fire with fire when it comes to defending against the rising corporate deepfake threat

    1. Photo of Daryl Huff

      Daryl Huff

      VP of Biometrics & Identity Technologies, Jumio

  18. Driving Compliance: The Data Protection Risks of Connected Car Technology

    Jonathan Armstrong discusses the growing data security and privacy risks in connected cars

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Punter Southall Law

  19. A Court Ruling on Bug Bounties Just Made the Internet Less Safe

    Congress and the Trump Administration Must Fix a Ruling prohibiting private companies from retroactively authorizing access to their systems, says Jerry Archer

    1. Photo of Jerry Archer

      Jerry Archer

      Past Board Member and Co-Founder, Cloud Security Alliance

  20. How to Address Growing Security Risks in Cyber-Physical Systems

    Francesca Boem warns that IoT security vulnerabilities affect the safety and reliability of critical systems

    1. Photo of Francesca Boem

      Francesca Boem

      Associate Professor, Electronic and Electrical Engineering Department, University College London

What’s Hot on Infosecurity Magazine?