Infosecurity Magazine Features

  1. Magecart Attacks: The Card Skimming Epidemic

    Looking at the common tactics contributing to recent Magecart attack success and explores how to defend against them.

    1. Photo of Kacy Zurkus

      Kacy Zurkus

      News Writer

  2. You’ve Got M@il: The Rise of Business Email Compromise

    Danny Bradbury assesses how BEC attacks have become a top social engineering threat to organizations of all sizes

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  3. Advancements in Authentication: Improving Security vs Creating New Problems

    Two experts discuss whether advancements in authentication have led to better security, or created new problems

    1. Photo of Maritza  Johnson

      Maritza Johnson

      VP of Research and Privacy

    2. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  4. NHS at 70: Growing Old & Growing Threats

    As the NHS turns 70, Kathryn Pick assesses the UK healthcare provider’s evolution of information security

  5. Are Blue Teamers the True Heroes?

    Is it time to recognize those tasked with defending and recovering from incidents?

  6. The Murky Market for Zero-Day Bugs

    With zero-day exploits now hot property among hackers and researchers, Danny Bradbury shines a light on the thriving online marketplace that has arisen as a result

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  7. Barack Obama

    Eleanor Dallaway reports on the highlights of Barack Obama's Oktane keynote

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  8. Ask The Experts: How to Run an Effective Cybersecurity Awareness Program

    Three experts ponder the question of how to deliver an effective internal awareness program for cybersecurity.

    1. Photo of Jessica  Barker

      Jessica Barker

      Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

    2. Photo of Candice Carter

      Candice Carter

      Chair, MS-Cybersecurity and Assistant Professor, Wilmington University

    3. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  9. Top Ten Regulatory Monetary Penalties

    Infosecurity looked at some of the highest regulatory fines when compliance gets severe.

  10. Q&A: Dido Harding

    Dido Harding opens up about the infamous TalkTalk breach, her lessons learnt and plans for the future

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  11. Why Are Breaches Getting Worse?

    Despite increased budgets, better awareness and improved board buy-in, data breaches are not only becoming more common, but also more explosive.

    1. Photo of Kacy Zurkus

      Kacy Zurkus

      News Writer

  12. LORCA: Driving Startup Growth & Innovation

    Michael Hill attended the official opening of East London’s new center for cybersecurity advancements and reports on the new development

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Evolution of the Cybercrime-as-a-Service Epidemic

    Over the past few years, the as-a-service model has both broadened and deepened the overall cybercrime threat.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  14. Breach Accountability: Blaming the CISO vs An End to Shaming

    Two experts discuss where accountability for data breaches should lie

    1. Photo of Dr John  I. Meakin

      Dr John I. Meakin

      Group CISO, GSK

    2. Photo of Theresa Payton

      Theresa Payton

      CEO and President, Fortalice Solutions

  15. Cyber-Attacks by Vertical: Battle of the Sectors

    It’s not just banks and other financial businesses that are at risk, but every type of institution.

  16. CISOs and Security Vendors: A Challenging Symbiotic Relationship

    Jaikumar Vijayan takes a look at the often strained relationship between CISOs and security vendors and compiles advice on how they can most effectively work together

    1. Jaikumar Vijayan

      Freelance Writer

  17. Cybersecurity on a Budget

    What do you do when the budget you have at your disposal is tight, or worse, really isn’t enough?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Accelerating Great British Cybersecurity Startups

    Wendy M. Grossman assesses the current state and effectiveness of the UK’s cybersecurity accelerator and incubator landscape

    1. Wendy M. Grossman

      Contributing Writer

  19. Top Ten Ways to Reduce Your Digital Footprint

    What are the options to reduce the size of your digital footprint and how can you take steps to make yourself less visible online?

  20. World War Cyber

    As nation states battle it out for supremacy in cyber-space, Phil Muncaster asks what the future has in store.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?