Opinion: Page 2

The latest opinion pieces by industry thought leaders


If you are interested in having your voice heard on Cybersecurity Dive's Opinion page, please read our editorial guidelines and fill out the submission form here.

  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    It's time to focus on critical infrastructure systems security

    Cyber-physical systems running on legacy infrastructure are ideal attack surfaces for malicious actors. 

    Katell Thielemann • Jan. 24, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Beyond backup: Modern ransomware coercion tactics and how to detect them before it is too late

    Despite lots of ransomware advice centering on backing up files and systems, it's important to remember that precursors to ransomware can be identified and attacks disrupted, the author writes. 

    George Glass • Dec. 9, 2021
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    3 ways the cybercriminal business is changing

    Now that ransomware has been thrust into the limelight, cybercriminals are adjusting their business models. Here is what enterprises need to know.

    Robert McArdle • Nov. 29, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    How to secure the enterprise against REvil-style attacks

    There is no way to fully protect against advanced attacks such as zero-day vulnerabilities or nation-state threats — responding quickly is critical to minimizing damage.

    Chris Silva • Oct. 12, 2021
  • Image attribution tooltip
    gopixa via Getty Images
    Image attribution tooltip

    Time to be less dramatic about ransomware

    Security is an aspect of normal operations. Proactive, broad measures can mitigate the risk of whatever threat is currently present or yet to come.

    Patricia Muoio • Aug. 31, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Why most companies don't understand speed is vital to cybersecurity

    In cybersecurity folk wisdom, frequent releases are scary and the foundation for security failure. Why is there this disconnect between cybersecurity superstition and reality?

    Kelly Shortridge • Aug. 24, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    3 ways to assess the effectiveness of security awareness training

    Failure to prove the effectiveness of a security awareness program can lower the executive support critical to ensuring participation in the program.

    Richard Addiscott • June 14, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Orbon Alija/ E+/Getty via Getty Images
    Image attribution tooltip

    IoT cybersecurity law does not go far enough to protect industry

    As networks become more connected and reliant on third-party sources like cloud and SaaS applications, most companies continue to have massive blind spots. 

    Justin Fier • April 5, 2021
  • Prioritizing risk in M&A due diligence in the COVID-19 era, and beyond

    Imagine acquiring a company with an infected network, and then connecting your company to that flawed network. That can introduce serious issues into a previously protected company. 

    Ray Rothrock • March 22, 2021
  • Gartner: Steps to respond to a supply chain attack

    Businesses require tools to detect the lateral movement from an initial compromise and an incident response plan.

    Peter Firstbrook • Feb. 1, 2021