Opinion: Page 2

The latest opinion pieces by industry thought leaders


If you are interested in having your voice heard on Cybersecurity Dive's Opinion page, please read our editorial guidelines and fill out the submission form here.

  • Group of young business people discussing with colleagues on video conference on meeting.
    Image attribution tooltip
    vgajic via Getty Images
    Image attribution tooltip

    How CISOs can prepare for new and unpredictable cyberthreats

    CISOs often ask, “How do I avoid being hit by the next major cyberattack?” The problem is, that’s the wrong question.  

    Jeremy D’Hoinne • July 11, 2022
  • Young businesswoman in casual clothing
    Image attribution tooltip
    eclipse_images via Getty Images
    Image attribution tooltip

    Now is the time to break gender bias in cybersecurity

    A hidden epidemic that has hindered women’s ability to continue working at pre-pandemic levels is expected to impact infosec.

    Jinan Budge • April 12, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    Midsize enterprises: Strengthen security for today's threat landscape

    Midsize enterprises must protect against the same security threats as larger organizations, but with smaller budgets and fewer IT resources.

    Paul Furtado • April 4, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip

    Telecoms are essential to everyone's cybersecurity challenges

    Communications systems are accessible almost anywhere, at any time by both friend and foe alike.

    Jason Atwell • March 21, 2022
  • Image attribution tooltip
    Paul O''Driscoll via Getty Images
    Image attribution tooltip

    Would a cyberattack on a NATO country trigger Article 5?

    Few nations have sophisticated cyber capabilities and for operational security reasons, they are closely guarded, rarely shared, and carefully used.

    Mark Laity • March 2, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    Talk to the board, not just IT, about ransomware

    The spread of fast-moving cyberattacks accelerates the need for rapid, clear communication between end-users, security teams and the board.

    Lucia Milică • Feb. 4, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    It's time to focus on critical infrastructure systems security

    Cyber-physical systems running on legacy infrastructure are ideal attack surfaces for malicious actors. 

    Katell Thielemann • Jan. 24, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Beyond backup: Modern ransomware coercion tactics and how to detect them before it is too late

    Despite lots of ransomware advice centering on backing up files and systems, it's important to remember that precursors to ransomware can be identified and attacks disrupted, the author writes. 

    George Glass • Dec. 9, 2021
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    3 ways the cybercriminal business is changing

    Now that ransomware has been thrust into the limelight, cybercriminals are adjusting their business models. Here is what enterprises need to know.

    Robert McArdle • Nov. 29, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    How to secure the enterprise against REvil-style attacks

    There is no way to fully protect against advanced attacks such as zero-day vulnerabilities or nation-state threats — responding quickly is critical to minimizing damage.

    Chris Silva • Oct. 12, 2021
  • Image attribution tooltip
    gopixa via Getty Images
    Image attribution tooltip

    Time to be less dramatic about ransomware

    Security is an aspect of normal operations. Proactive, broad measures can mitigate the risk of whatever threat is currently present or yet to come.

    Patricia Muoio • Aug. 31, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Why most companies don't understand speed is vital to cybersecurity

    In cybersecurity folk wisdom, frequent releases are scary and the foundation for security failure. Why is there this disconnect between cybersecurity superstition and reality?

    Kelly Shortridge • Aug. 24, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    3 ways to assess the effectiveness of security awareness training

    Failure to prove the effectiveness of a security awareness program can lower the executive support critical to ensuring participation in the program.

    Richard Addiscott • June 14, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Orbon Alija/ E+/Getty via Getty Images
    Image attribution tooltip

    IoT cybersecurity law does not go far enough to protect industry

    As networks become more connected and reliant on third-party sources like cloud and SaaS applications, most companies continue to have massive blind spots. 

    Justin Fier • April 5, 2021
  • Prioritizing risk in M&A due diligence in the COVID-19 era, and beyond

    Imagine acquiring a company with an infected network, and then connecting your company to that flawed network. That can introduce serious issues into a previously protected company. 

    Ray Rothrock • March 22, 2021
  • Gartner: Steps to respond to a supply chain attack

    Businesses require tools to detect the lateral movement from an initial compromise and an incident response plan.

    Peter Firstbrook • Feb. 1, 2021