Infosecurity Opinions
Unlocking the Data Transfer Dilemma: the EU-US Data Privacy Framework
Lawyers from Wilson Sonsini discuss whether the EU-US Data Privacy Framework will stand up to legal scrutiny
How to Prepare for NIS2
Tom Venables sets out the areas organizations must focus on to ensure they are compliant with the NIS2 directive ahead of October 2024
Why Businesses Ignore Incident Response at Their Peril
Phil Robinson explores the dangers around businesses lethargy towards incident response planning
The Gender Gap is Widening in Cyber – What Can We Do About it?
Nominet's Kim Wiles discusses how the industry can boost female representation in cybersecurity
It’s Time to Elevate the Humble SBOM
Pieter Danhieux discusses how to ensure the SBOM tech stack is implemented and integrative
Navigating the Future with Generative AI: Treating AI as a Trusted Colleague
Organizations that treat AI like a colleague to help embed trust in its contribution are likely to benefit most from this tool
Paving a Path to Security by Design Across the Industry
SolarWinds CISO, Tim Brown, explains why security by design is a shared responsibility involving governments, businesses and individuals
How to Securely Manage the Data of Vulnerable Groups
Jessica Perkins sets out six best practices to safeguard the data of vulnerable groups
Why it’s Time to Kick the Password Habit
The FIDO Alliance's Andrew Shikiar argues that we are at the tipping point of passkey adoption
How to Ensure Cyber Resilience Across the Supply Chain
Business leaders must take a proactive and multi-layered approach to cybersecurity to avoid and defend against the risks of supply chain cyber-attacks
Does the White House’s National Cyber Workforce and Education Strategy Go Far Enough?
Mike Britton argues that the new strategy is welcome, but could go further
The Impact of Artificial Intelligence on Software Development
Jamie Boote warns developers, architects and QA testers to remain vigilant over the use of AI in software development