Infosecurity Opinions

  1. DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US

    Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries

    1. Photo of Alisa Chestler

      Alisa Chestler

      Shareholder, Baker Donelson

    2. Photo of Vivien F. Peaden

      Vivien F. Peaden

      Shareholder, Baker Donelson

  2. The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses

    Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be

    1. Photo of Rebecca Steer

      Rebecca Steer

      Commercial Partner, Charles Russell Speechlys

  3. How to Put Humans at the Forefront of Retail Cyber Defense

    PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees

    1. Photo of Richard Allen

      Richard Allen

      Cybersecurity Expert, PA Consulting

  4. Cyber House Party: A Journey of Connection, Music and Purpose

    Cyber House Party returns to Infosecurity Europe 2025

    1. Photo of Nikki Webb

      Nikki Webb

      Global Channel Manager, Custodian 360

  5. Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground

    Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations

    1. Photo of Daniel Kapellmann Zafra

      Daniel Kapellmann Zafra

      Security Engineer, Google Threat Intelligence Group

  6. The True Value of Undersea Cable Security

    Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them

    1. Photo of Federico Bruni

      Federico Bruni

      Manager, Frontier Economics

  7. Analyzing the Current Cloud Threat Landscape

    Paolo Passeri sets out current trends in the cloud threat landscape

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  8. Businesses Should Take a Lifecycle Approach to Device Security

    HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

    1. Photo of Alex Holland

      Alex Holland

      Principal Threat Researcher, HP

  9. Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework

    Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react

    1. Photo of Dr Divya Sridhar

      Dr Divya Sridhar

      Vice President, Global Privacy Initiatives & Operations, BBB National Programs

  10. AI's Dark Side: The Emergence of Hallucinations in the Digital Age

    KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations

    1. Photo of Indy Dhami

      Indy Dhami

      Partner, Cyber Security, Financial Services Advisory, KPMG

  11. The Ursala of AI Wants Your Voice

    Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies

    1. Photo of Leeza Garber

      Leeza Garber

      Privacy & Cybersecurity Attorney

    2. Photo of Gail Gottehrer

      Gail Gottehrer

      Corporate Lawyer and Cybersecurity Executive

  12. It’s Time to Stop Accepting Losses in Cybersecurity

    John Kindervag argues that we should shift from risk management to danger management in cybersecurity

    1. Photo of John Kindervag

      John Kindervag

      Creator of Zero Trust and Chief Evangelist Officer at Illumio

  13. Rethinking Resilience for the Age of AI-Driven Cybercrime

    Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  14. Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths

    Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age

    1. Photo of Keatron Evans

      Keatron Evans

      Cybersecurity and Workforce Development Expert, Infosec Institute

  15. Challenges Facing the UK Government’s Proposed Ransomware Ban

    Andrew Rose discusses issues and pitfalls around the UK government's proposed ransomware payment ban

    1. Photo of Andrew Rose

      Andrew Rose

      CSO, SoSafe

  16. How Security Professionals Can Prepare for the CISO Role

    ISACA's Sushila Nair explains the different skills security professionals need to learn during their careers to prepare for leadership positions

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  17. Preparing for the Realities of a Ransomware Confrontation

    Raj Samani advises on how to prepare for the reality of facing a ransomware demand

    1. Photo of Raj Samani

      Raj Samani

      SVP, Chief Scientist, Rapid7

  18. Combating the Invisible Threat of In-Memory Cyber-Attacks

    Brad LaPorte discusses the growing trend of in memory, runtime-based attacks, which are exceptionally difficult for defenders to detect

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  19. From Legacy Systems to 5G: Enterprise Security Threats in 2025

    The GSMA's Sam Knight sets out the ways attackers are targeting expanding attack surfaces

    1. Photo of Samantha Kight

      Samantha Kight

      Head of Security Industry, GSMA

  20. Incident Management: How to Ensure Your Organization Can Handle a Crisis

    TD Bank's Gaya Ratnam discusses how organizations can improve their incident management amid surging cyber attacks

    1. Gaya Ratnam

      Manager, Enterprise Technology Risk Management, TD Bank

What’s hot on Infosecurity Magazine?