Infosecurity Opinions

How to Keep Ourselves Safe from AI as it Evolves
Professor Gaven Smith says human centered interventions are required to mitigate AI risks such as bias, surveillance and misinformation

Escaping the Detection Trap: Is EDR Giving You a False Sense of Security?
Traditional EDR tools are falling short as modern threats evolve. This article explores how fast-moving adversaries are exploiting defender tools, creating a false sense of security and overwhelming security teams

The CISO's Crucible – Finding Strength in Control
Deloitte's Peter Gooch discusses how CISOs can overcome the immense strains and challenges of their roles

Private Sector Must Shore up UK’s Cyber Defense
SCC's Chris McGrath argues that siloed UK government structures requires a coordinated private sector-enabled solution to protect businesses and critical services

How Security Teams Can Manage Agentic AI Risks
Gitlab's Josh Lemos argues organizations must develop new approaches to identity management, network security, and data protection to mitigate risks to AI agents

NIS2 and DORA explained: What Every Business Leader Needs to Know
ISACA's Chris Dimitriadis argues that compliance with NIS2 and DORA has become a market enabler for businesses

Beyond the Score: Rethinking Vulnerability Management in a Contextual Era
Action1's Gene Moody argues that managing vulnerabilities goes far beyond chasing high CVSS scores

Vibe Coding: Managing the Strategic Security Risks of AI-Accelerated Development
Murali Sastry says vibe coding is the future, but only for those prepared to manage its security risks

The Evolving Role of the CISO: From Security Experts to Strategic Communicators
FGS Global's Kirsti Hastings says CISOs must strengthen communications skills to be resilient to the next cyber event

In Conversation: Learnings for CISOs Post Black Hat and DEF CON
OpenSSF's Christopher “CRob” Robinson discusses highlights open source discussions around AI security, SBOM adoption and government support

Staying Silent After a Breach Isn’t Caution, it’s Complicity
Bitdefender’s Nicholas Jackson argues that the consequences of staying silent after a breach are far worse than the perceived benefits

The Costs of Toxic Data – And How to Avoid Them
FTI's Deana Uhl reveals how organizations can find toxic data and what do with it once it’s been uncovered

Winning the AI Arms Race in Financial Services Cybersecurity
Broadridge CISO David Ramirez warns that financial services will need to leverage AI to stay ahead of sophisticated threat actors

The Quantum Countdown: Preparing Today for Tomorrow’s Encryption Crisis
Security leaders must ensure the board is aware that the quantum risk isn't theoretical, it's happening now

How to Understand and Adapt to Modern Cyber Threats
Darren Guccione warns that conventional cybersecurity is ineffective against a modern attacker

Building a New Generation of Security Talent Amid an Escalating Cyber Crisis
DeVry University's Elise Awwad urges coordinated action to train new cyber professionals

How to Secure the UK’s Quantum Economy
BT’s Gabriela Styf Sjöman explains how the UK can lay secure foundations for the future implementation of quantum technologies

CMMC Compliance: Far More Than Just an IT Issue
With enforcement tightening around CMMC rules, LRQA's Brian Rhodes says US defense contractors must undertake a full-scale organizational transformation to ensure compliance

The Corporate Deepfake Invasion: Safeguarding Enterprises in the AI Era
Daryl Huff says businesses must fight fire with fire when it comes to defending against the rising corporate deepfake threat

Driving Compliance: The Data Protection Risks of Connected Car Technology
Jonathan Armstrong discusses the growing data security and privacy risks in connected cars
























