Infosecurity Opinions
DOJ Cross-Border Data Transfers Rule: Key Implications for Companies Operating in the US
Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific foreign countries
The UK’s New Cyber Security Bill: A Call to Action for Tech Businesses
Rebecca Steer sets out what the key focus of the UK's Cyber Security and Resilience law is likely to be
How to Put Humans at the Forefront of Retail Cyber Defense
PA Consulting's Richard Allen discusses how sectors like retail can changes cybersecurity behaviors of employees
Cyber House Party: A Journey of Connection, Music and Purpose
Cyber House Party returns to Infosecurity Europe 2025
Hacktivism Reborn: How a Fading Cyber Threat Has Become a Modern Battleground
Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to organizations
The True Value of Undersea Cable Security
Federico Bruni explains the economic value of cloud data flow and the cables that carry them, and the importance of ensuring cyber resiliency is built into them
Analyzing the Current Cloud Threat Landscape
Paolo Passeri sets out current trends in the cloud threat landscape
Businesses Should Take a Lifecycle Approach to Device Security
HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life
Trump Administration Playing Truth or Dare with EU-US Data Privacy Framework
Divya Sridhar discusses the impact of Trump administration actions on the EU-US data privacy framework, and how organizations should react
AI's Dark Side: The Emergence of Hallucinations in the Digital Age
KPMG’s Indy Dhami says the cybersecurity community must work collaboratively to mitigate the impact of AI hallucinations
The Ursala of AI Wants Your Voice
Leeza Garber discusses the unique cybersecurity challenges posed by AI voice cloning technologies
It’s Time to Stop Accepting Losses in Cybersecurity
John Kindervag argues that we should shift from risk management to danger management in cybersecurity
Rethinking Resilience for the Age of AI-Driven Cybercrime
Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility
Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths
Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age
Challenges Facing the UK Government’s Proposed Ransomware Ban
Andrew Rose discusses issues and pitfalls around the UK government's proposed ransomware payment ban
How Security Professionals Can Prepare for the CISO Role
ISACA's Sushila Nair explains the different skills security professionals need to learn during their careers to prepare for leadership positions
Preparing for the Realities of a Ransomware Confrontation
Raj Samani advises on how to prepare for the reality of facing a ransomware demand
Combating the Invisible Threat of In-Memory Cyber-Attacks
Brad LaPorte discusses the growing trend of in memory, runtime-based attacks, which are exceptionally difficult for defenders to detect
From Legacy Systems to 5G: Enterprise Security Threats in 2025
The GSMA's Sam Knight sets out the ways attackers are targeting expanding attack surfaces
Incident Management: How to Ensure Your Organization Can Handle a Crisis
TD Bank's Gaya Ratnam discusses how organizations can improve their incident management amid surging cyber attacks