Infosecurity Magazine, Digital Edition, Q1, 2022, Volume 19, Issue 1

Read Now

To read this digital edition you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

>>>>> Log in to read the full Q1 2022 issue >>>>>

The Security Challenge of the Century: Security in the Metaverse

Kate O'Flaherty considers how the security challenges in the metaverse can be resolved

Diversifying Cyber: A Focus on Neurodiversity and Physical Disability

James Coker takes a deep dive into the NCSC's recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber

Cybersecurity's Image Problem

Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how they could be improved

Securing Smart Cities from Ransomware Crooks

Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution

How Not To Pay a Ransomware Demand

Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand

Dissecting the UK's New IoT Security Bill

The UK's new Product Security and Telecommunications Infrastructure (PSTI) Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?

Cyber Start-Ups: How To Get Off the Ground and Into the Stratosphere

Phil Muncaster investigates how to make it big in a sector already worth billions

One Topic, Three Experts: How To Stay on Top of Cyber-Hygiene

Three security experts advise how to develop a continuous cyber-hygiene plan for your organization

Point-Counterpoint: Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No, We Shouldn't

Ira Winkler believes you should attribute appropriate blame and penalties to users in case of clear negligence, while Wendy Nather argues this approach is counterproductive

Top Ten

Cyber-secure Countries 

Interviews

  • Camille Stewart: The inspirational Camille Stewart outlines what she would change about the cyber industry and explains her dream project
  • Jenny Radcliffe: Eleanor Dallaway tries to 'hack' the people hacker, Jenny Radcliffe, as they take a walk down memory lane, from the streets of Liverpool to the TED Talks stage
  • Sarah Armstrong-Smith: Microsoft's Sarah Armstrong-Smith gives the lowdown on her career and reveals her biggest professional regret and the ingredients for a dream team

>>>>> Log in to read the full Q1 2022 issue >>>>>

Should you read our digital magazine your information may be added to our digital magazine email list and you will receive the digital magazine four times per year. See our privacy policy for more information.