Infosecurity Opinions
Pandemic Development Risks Non-Compliance with White House Guidelines
Meredith Bell sets out what companies need to do to meet their data security responsibilities in light of the White House's National Cybersecurity Strategy
How To Prevent Ransomware Attackers Striking Again
Charles Smith explains the risk factors for repeat attacks and how victim organizations can prevent this occurring
Reviewing the UK Government Call for Views on Supply Chain Threats
Michael Smith says that open dialogue is the first step to improving supply chain security
Generative AI: Friend or Foe?
Joe Partlow assesses the security threats and benefits of generative AI
NATO Countries Must Work Together to Counter the Russian Cyber-Threat
William Hutchison argues that NATO countries should be war-gaming what a full-on Russian cyber war would look like
How To Create an Effective Patch Management Program
Zoe Rose identifies considerations often forgotten when it comes to designing patch management programs
How Has GDPR Changed Our Approach to Data Protection?
Prof Kevin Curran discusses how the GDPR has changed organizations' security practices
How AI Will Change Red Teaming
Phil Robinson discusses how AI technologies can enhance the abilities of white hat hackers
Achieving Cyber Resilience in Undersea Cable Networks
Chris Moore discusses how governments can maintain resilient communication routes amid growing threats to undersea cables
#HowTo: Limit the Impact of Data Breaches
Ben Herzberg argues that organizations must create a balance between data protection and damage mitigation amid surging data breach incidents
Understanding the Growing Professionalism of Cyber-Criminals
Melissa Bischoping says organizations must know how threat actors are transforming their operations or risk being blindsided by an attack
Meta’s Data Practices Are in the Spotlight: Brands Should Pay Close Attention
Russell Howe says that corporations who disregard the wishes of consumers and regulators when it comes to data practices will be left behind
#HowTo: Protect Organizations Against ChatGPT Cyber-Threats
Jesper Trolle says organizations must take a proactive approach to defending against ChatGPT-related threats
#HowTo: Be Proactive in Your Incident Response Planning
Larry Gagnon argues that proactive approaches to IR planning can make their security investments more likely to pay off
#InfosecurityEurope: Preparing for Adversarial Machine Learning Attacks
CrowdStrike's Dr Sven Krasser outlines cyber-threats to AI and machine learning models
What Are the Ramifications of the Meta GDPR fine for UK Businesses?
Alasdair Anderson assesses the potential impact of Meta's record €1.2bn GDPR fine for the wider business world
Padding Users’ Defenses Against ChatGPT
FIDO Alliance's Andrew Shikiar highlights the importance of passwordless technology to overcome malicious use of ChatGPT
#HowTo: Create and Maintain SBOMs
Organizations must implement a best practice approach for creating and maintaining SBOMs to stay secure and competitive
Why Apps Like TikTok Can Be a Security Issue for Your Business
Recent TikTok bans will likely lead to organizations restricting what apps we can access in the work environment
The Open-Source Software in Our Pockets Needs Our Help
Growing reliance on inconsistently-vetted outside components in software is a ticking time bomb