Infosecurity Opinions
Why Enterprises and Governments Must Prepare for Q-Day Now
Quantum computers are here and in use - governments and enterprises must protect themselves against the risks
Forcing Security Expertise on Boards is Not the Answer, Here's What Is
CISOs should be given a voice at the board table to communicate cybersecurity risks and obtain buy-in for remediation
#CyberMonth: Strengthening Cybersecurity Resilience by Going Beyond Blame
Steve Forbes says human intelligence will be indispensable in the battle against AI-based phishing attacks
3 Things CISOs Should Be Doing This Cybersecurity Awareness Month and Beyond
Cybersecurity Awareness Month is a pivotal time to assess your enterprise's cybersecurity posture beyond the basics of multi-factor authentication, strong passwords, and up-to-date software
Preserving Digital Trust in an Era of Rapidly Evolving Threats
Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats
Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout
Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats
Responsible Cyber Operations: From Theory to Reality
Nick Beecroft discusses how to create a doctrine for being a responsible cyber power
Are Tabletop Exercises Still Relevant for Modern Cybersecurity?
Dotan Nahum sets out how to make the most of tabletop exercises in 2023 and beyond
How the Rise of Deepfakes Will Impact the 2024 Presidential Elections
Blair Cohen says it is time to harness AI’s power to minimize the impact deepfakes could have on the democratic process
#CyberMonth: Why Boardrooms Need a Stronger CISO Influence
Tony Buffomante discusses how to break the ice between cyber experts and board members
Challenging Old Ideas: The Ongoing Need to Empower Women in Tech
Cloudflare's Jen Taylor sets out how to break down barriers that prevent women from entering the tech workforce
#CyberMonth: Why MFA Is Not the Panacea the Industry Is Touting it to Be
Stu Sjouwerman urges organizations to pick a phishing-resistant MFA solution
#CyberMonth: Six Steps to Build a Positive Security Culture
Fred Kwong says effective security culture requires commitment from the top down
How to Comply with API Security Requirements in PCI DSS Version 4.0
Moss Adams experts set out five practical steps towards complying with API-related risks in the updated PCI-DSS standards
Four Data Security Challenges Set to Impact Organizations in the Coming Years
Steve Durbin sets out how organizations can prepare for significant security risks implicit with data
No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!
Alex Haynes highlights the challenges of communicating cybersecurity to a largely non-technical mass audience
#NITAM: A Surge in Quiet and Loud Quitters Presents New Threats
Elizabeth Harz explains why investing in an engaged workforce is a constructive way of reducing insider threats
How Will the Cyber Pathways Impact Your Career?
Jamal Elmellas discusses how the UK Cyber Security Council's Cyber Career Framework will impact the careers of cybersecurity professionals
Time to Demand IT Security by Design and Default
Tony Sibley says organizations and governments should demand IT companies implement secure by design and default into their services
Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework
Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny