Infosecurity Magazine Features
Magecart Attacks: The Card Skimming Epidemic
Looking at the common tactics contributing to recent Magecart attack success and explores how to defend against them.
You’ve Got M@il: The Rise of Business Email Compromise
Danny Bradbury assesses how BEC attacks have become a top social engineering threat to organizations of all sizes
Advancements in Authentication: Improving Security vs Creating New Problems
Two experts discuss whether advancements in authentication have led to better security, or created new problems
NHS at 70: Growing Old & Growing Threats
As the NHS turns 70, Kathryn Pick assesses the UK healthcare provider’s evolution of information security
Are Blue Teamers the True Heroes?
Is it time to recognize those tasked with defending and recovering from incidents?
The Murky Market for Zero-Day Bugs
With zero-day exploits now hot property among hackers and researchers, Danny Bradbury shines a light on the thriving online marketplace that has arisen as a result
Barack Obama
Eleanor Dallaway reports on the highlights of Barack Obama's Oktane keynote
Ask The Experts: How to Run an Effective Cybersecurity Awareness Program
Three experts ponder the question of how to deliver an effective internal awareness program for cybersecurity.
Top Ten Regulatory Monetary Penalties
Infosecurity looked at some of the highest regulatory fines when compliance gets severe.
Q&A: Dido Harding
Dido Harding opens up about the infamous TalkTalk breach, her lessons learnt and plans for the future
Why Are Breaches Getting Worse?
Despite increased budgets, better awareness and improved board buy-in, data breaches are not only becoming more common, but also more explosive.
LORCA: Driving Startup Growth & Innovation
Michael Hill attended the official opening of East London’s new center for cybersecurity advancements and reports on the new development
Evolution of the Cybercrime-as-a-Service Epidemic
Over the past few years, the as-a-service model has both broadened and deepened the overall cybercrime threat.
Breach Accountability: Blaming the CISO vs An End to Shaming
Two experts discuss where accountability for data breaches should lie
Cyber-Attacks by Vertical: Battle of the Sectors
It’s not just banks and other financial businesses that are at risk, but every type of institution.
CISOs and Security Vendors: A Challenging Symbiotic Relationship
Jaikumar Vijayan takes a look at the often strained relationship between CISOs and security vendors and compiles advice on how they can most effectively work together
Cybersecurity on a Budget
What do you do when the budget you have at your disposal is tight, or worse, really isn’t enough?
Accelerating Great British Cybersecurity Startups
Wendy M. Grossman assesses the current state and effectiveness of the UK’s cybersecurity accelerator and incubator landscape
Top Ten Ways to Reduce Your Digital Footprint
What are the options to reduce the size of your digital footprint and how can you take steps to make yourself less visible online?
World War Cyber
As nation states battle it out for supremacy in cyber-space, Phil Muncaster asks what the future has in store.