Infosecurity Opinions
Organizations Must Embrace Dynamic Honeypots to Outpace Attackers
Honeypots are no longer effective against sophisticated cyberattacks, and organizations should consider using dynamic AI-based honeypots instead
How to Avoid Fraud on Black Friday
Cybersecurity experts share tips for consumers, businesses and retailers on protecting against e-commerce scams this Black Friday and Cyber Monday
From Brews to Privacy Blues: Balancing Innovation and Privacy in the Digital Age
Businesses should follow key takeaways from the Tim Hortons app investigation to strike the right balance between innovation and privacy protection
We’ve Come a Long Way in Cybersecurity…But There is a Long Way to Go
Cybersecurity threats have become more sophisticated, requiring businesses and society as a whole to enhance their awareness and protection measures
Protection from Chip to Cloud: Tackling Emerging Security Risks in the Age of AI
Microsoft's Alan Slothower highlights the growing threat to firmware security from generative AI
Why Enterprises and Governments Must Prepare for Q-Day Now
Quantum computers are here and in use - governments and enterprises must protect themselves against the risks
Forcing Security Expertise on Boards is Not the Answer, Here's What Is
CISOs should be given a voice at the board table to communicate cybersecurity risks and obtain buy-in for remediation
#CyberMonth: Strengthening Cybersecurity Resilience by Going Beyond Blame
Steve Forbes says human intelligence will be indispensable in the battle against AI-based phishing attacks
3 Things CISOs Should Be Doing This Cybersecurity Awareness Month and Beyond
Cybersecurity Awareness Month is a pivotal time to assess your enterprise's cybersecurity posture beyond the basics of multi-factor authentication, strong passwords, and up-to-date software
Preserving Digital Trust in an Era of Rapidly Evolving Threats
Linda Betz discusses actions the financial sector must take to prepare for emerging cyber threats
Behind the Scenes: The Toll of Ineffective Security Tools on Analyst Burnout
Organizations are increasingly vulnerable to sophisticated cyberattacks, putting a strain on SOC teams. With limited resources and a growing attack surface, SOC teams are struggling to keep up with the relentless tide of cyber threats
Responsible Cyber Operations: From Theory to Reality
Nick Beecroft discusses how to create a doctrine for being a responsible cyber power