Infosecurity Opinions

  1. Data Privacy Week: Can Businesses Navigate the PII Labyrinth in the Age of Cyber Threats?

    With stricter regulations and evolving threats, organizations must re-evaluate how they collect, store, and manage customer data

    1. Photo of Petra Tesch

      Petra Tesch

      Chief Information Officer, Vizrt

  2. Data Privacy Week: Navigating Data Privacy in the Age of AI

    Lawyers from Hanson Bridgett say there must be a commitment to responsible AI practices to navigate the changing data regulation landscape

    1. Photo of Jenny  Dao

      Jenny Dao

      Associate, Hanson Bridgett

    2. Photo of Batya Forsyth

      Batya Forsyth

      Partner, Hanson Bridgett

    3. Photo of Rob McFarlane

      Rob McFarlane

      Partner, Hanson Bridgett

  3. Data Privacy Week: Will the US Adopt a Federal Data Privacy Law in 2024?

    Vishal Gupta asks whether the US will take meaningful steps towards data privacy legislation this year

    1. Photo of Vishal Gupta

      Vishal Gupta

      CEO & Co-Founder, Seclore

  4. Data Privacy Week: AI Has Put Data Privacy Top of Mind

    Neil Thacker highlights how many data protection issues can be solved with AI

    1. Photo of Neil Thacker

      Neil Thacker

      EMEA and LATAM CISO, Netskope

  5. Election Security 2024: Biggest Cyber Threats and Practical Solutions

    With half the world voting in 2024, global tech giants warn of rising misinformation and disinformation threats to elections worldwide

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  6. Hackathons Are Far More Than a Big Tech Indulgence

    Manish Kamra says hackathons remain a vital method for learning and innovation in cybersecurity

    1. Photo of Manish Kamra

      Manish Kamra

      Group Vice President Engineering, N-able

  7. It's Time to Take a Modern Approach to Password Management

    Raul Zeppenfeldt Molina says that the password breach incidents in 2023 show we must adopt a modern approach to authentication

    1. Photo of Raul Zeppenfeldt  Molina

      Raul Zeppenfeldt Molina

      Cybersecurity Expert, PA Consulting, PA Consulting

  8. The UK-US Data Bridge: How to Simplify Transfers Across the Atlantic

    Tim Hickman sets out practical considerations for organizations applying the new UK-US data bridge mechanism

    1. Photo of Tim Hickman

      Tim Hickman

      Partner, White & Case LLP

  9. Navigating Investment, Innovation, and Regulation in Cyber Next Year

    Julian Cunningham-Day says businesses must learn how to navigate an increasingly complex legal and risk landscape next year

    1. Photo of Julian Cunningham-Day

      Julian Cunningham-Day

      TMT Partner and Global Co-Head of Fintech, Linklaters

  10. Is Your Kettle Spying on You? The Reality of IoT Device Security

    Shahram Mossayebi says we must embrace quantum-proof security measures now to stay ahead in the race against criminals

    1. Photo of Shahram Mossayebi

      Shahram Mossayebi

      CEO and Co-Founder, Crypto Quantique

  11. How to Comply with Ever-Changing Data Protection Regulations

    Katie Simmonds sets out the main challenges organizations face in achieving compliance with data privacy regulations

    1. Photo of Katie  Simmonds

      Katie Simmonds

      Managing Associate, Womble Bond Dickinson

  12. The CISO Journey in 2024: Looking at the Year Ahead

    As security threats grow more sophisticated and new regulations emerge, CISOs face an increasingly challenging job landscape

    1. Photo of Kayla  Williams

      Kayla Williams

      CISO, Devo

  13. Demystifying Cyber Resilience: From Best Practice to Execution

    Francesco Chiarini, founder of High Value Target, explores what cyber resilience truly means for organizations – and how they can achieve it

    1. Photo of Francesco Chiarini

      Francesco Chiarini

      Founder & Chief Researcher, High Value Target

  14. Why Meeting the SEC’s Board Diversity Rules Benefits Your Organization

    Larry Whiteside Jr. explains why increasing the diversity of boardrooms is good for business and security

    1. Photo of Larry  Whiteside Jr

      Larry Whiteside Jr

      Co-Founder and President, Cyversity and CISO, RegScale

  15. Why Centralizing Your Content is Vital for Privacy Compliance

    Box's Leah Perry discusses how organizations can handle fluctuations in privacy laws around the globe

    1. Photo of Leah Perry

      Leah Perry

      Chief Privacy Officer, Box

  16. Organizations Must Embrace Dynamic Honeypots to Outpace Attackers

    Honeypots are no longer effective against sophisticated cyberattacks, and organizations should consider using dynamic AI-based honeypots instead

    1. Photo of Kunal  Anand

      Kunal Anand

      CTO & CISO at Imperva

  17. How to Avoid Fraud on Black Friday

    Cybersecurity experts share tips for consumers, businesses and retailers on protecting against e-commerce scams this Black Friday and Cyber Monday

  18. From Brews to Privacy Blues: Balancing Innovation and Privacy in the Digital Age

    Businesses should follow key takeaways from the Tim Hortons app investigation to strike the right balance between innovation and privacy protection

    1. The Roberts & Obradovic Team

      Roberts * Obradovic

  19. We’ve Come a Long Way in Cybersecurity…But There is a Long Way to Go

    Cybersecurity threats have become more sophisticated, requiring businesses and society as a whole to enhance their awareness and protection measures

    1. Photo of Chris Dimitriadis

      Chris Dimitriadis

      Chief Global Strategy Officer, ISACA

  20. Protection from Chip to Cloud: Tackling Emerging Security Risks in the Age of AI

    Microsoft's Alan Slothower highlights the growing threat to firmware security from generative AI

    1. Photo of Alan Slothower

      Alan Slothower

      Head of Surface Commercial UK, Microsoft

What’s hot on Infosecurity Magazine?