Infosecurity Magazine Features
Profile Interview: Mikko Hyppönen
Michael Hill sits down with F-Secure’s chief research officer to find out a little more about the man who has served the same company for almost 30 years
Cryptojacking - The Parasitical Crime
Cryptojacking doesn’t destroy data. Instead, it chews up computing resources. Have criminals have finally found a largely victimless crime?
A Tough Month for Facebook
As the Cambridge Analytica scandal unfolds, Danny Bradbury takes a closer look at Facebook’s track record as it pertains to data and privacy
Ask the Experts: How to Win Cybersecurity Buy-in From the Board
Infosecurity Magazine asked three experts to tell us how they win cybersecurity buy-in from the boardroom
Password Managers: Business Gains vs Potential Pains
Is a password manager a solution to authentication problems, or another burden on security?
Information Security Challenges in the Cloud
An update on the highs, lows and the cloudy areas of security challenges in a fast-evolving cloud environment.
The Dark Side of the GDPR
While bringing a new dawn of data protection to Europe, the GDPR could also bring a negative side with fraudsters, activists and phishers all ready to pounce on the regulation’s capabilities.
Millennials in the Cybersecurity Workforce
It’s been estimated that just 12% of the cybersecurity workforce is under 35, with gaps between what hiring managers prioritize and what they feel millennials offer as employees
How Veterans Are Defending Our Networks
Thanks to the cybersecurity skills gap, Danny Bradbury finds military veterans are serving in a different kind of role
Top Ten Ways to Detect Phishing
Infosecurity spoke to three anti-phishing vendors to get the best advice on how to avoid becoming a victim.
Diversity in Cybersecurity: A Problem without a Quick Fix
Kathryn Pick explores why diversity in cybersecurity is a far wider topic than gender inequality.
Spectre: An Analysis
The truth behind Spectre, the fundamental issues it brings to light and its potential impact going forward
IoT Regulation: One Rule to Bind Them All vs Mission Impossible
Two experts explore whether the IoT could (and should) be regulated
Are Humans the Weakest Link in the Security Chain?
For too long, the human has been considered the weakest security link. Wendy M. Grossman asks whether it’s time for a change in thinking
Cyber Essentials: Fad or Future
Back in 2014, the state of cybersecurity had got so troublesome that the UK government developed a standard to prove a level of cyber-hygiene. Infosecurity takes a look at the progress that Cyber Essentials has made, and analyzes its success.
Ask the Experts: How Do You Find Cybersecurity Talent?
Three security experts share their thoughts on finding, cultivating and keeping skilled talent amid a cyber-skills gap
Top Ten: Cybersecurity M&A Deals
The M&A factor has seen established companies become part of another, brands disappear, technologies launched and most importantly – new companies and sectors created
Security & the Social Network: the Good, the Bad & the Overshared
"We all live in a digital age and benefit from social media but we don't have to put everything about ourselves out there! "
When IoT Attacks: The End of the World as We Know It?
As IoT devices find their way into everything from aircraft to power plants and even home appliances, Phil Muncaster asks where our obsession with tech disruption will lead us.
Interview: Graham Cluley
Not every infosec expert would liken computer programming to writing a story, but Graham Cluley does. Michael Hill spends an afternoon with the man whose love of a tale preceded his love of tech