Infosecurity Magazine Features
The Top Ten DDoS Attacks of all Time
The DDoS attack has moved from a sign of cyber-protest to something tactically used to bring websites, applications and even DNS providers offline.
Interview: Charlie Miller
Interview with Charlie Miller, lead of Autonomous Transportation Security at Didi Chuxing.
The CISO of the Future: Getting Down to Business
As the role that cybersecurity plays in the business environment grows, Michael Hill investigates how the job of the CISO will change from one which once solely oversaw technical solutions to one that will be ever-more business-orientated
Trump’s First Cybersecurity Scorecard
‘C for effort – could try harder’ seems to be the overall judgment of Trump’s first quarter as President, reports Danny Bradbury
Artificial Intelligence: The Obstacles Standing in its Way
AI is coming and I’d love to tell you it is almost here, yet the reality is there are some sizeable obstacles that stand in the way.
The Future of Security: AI and Cognitive
Companies must filter massive amounts of data found in network and system logs, directories, database access records and other machine information.
Using Deception to Hunt Cyber Attackers
Deception enables the organization to thwart attacks even if it is lacking experienced hunters
How to Effectively Spend Information Security Budget
Three experts share their thoughts on the best way to spend budget on information security.
Interview: Chris Wysopal, CTO of Veracode
Chris Wysopal from Veracode describes his job as “building services that enable developers to write secure code.”
Could High Speed Training Offer an Express Route to Solving the Skills Gap?
Following the launch of the Cyber Retraining Academy, Stephen Jones, UK MD at SANS Institute, argues that if we are to provide an immediate resolution to the urgent cybersecurity skills gap, recruiters must prioritize psychometric testing and high-speed training over degrees and ‘career experience’
The Top Ten Data Breaches of All Time
While the data collection and retention concept has taken off as the online world has evolved, the cost has been major losses and breaches of that data suffered by those entrusted to securely store it.
Interview: Dr Jessica Barker
There aren’t many things as intricate and complex as information security, but human behavior is probably one of them. At least, that’s the message Michael Hill got after spending an afternoon with independent cybersecurity consultant Dr Jessica Barker.
Interview: Javvad Malik
Javvad Malik, perhaps equally known as @J4VV4D or one of the three Host Unknown musketeers, wanted to be an actor when he grew up. More specifically, a wise-cracking side-kick, or a menacing villain. Instead, he’s a security advocate at AlienVault, where his job is to make information security as accessible and understandable to as broad an audience as possible. Whilst there may not be a red carpet, he finds it “immensely rewarding to see how we help secure organizations”.
Killing Me Softly with His Hack
Cybersecurity attacks can, and have, killed companies – but now analysts think larger firms will fall.
The Future of Encryption
As technology advances so does our ability to encrypt data, with neural networks now capable of learning how to keep data safe. With so much innovation at our fingertips, Davey Winder explores where else encryption might go in the future.
Laying the Smackdown - When Hacking Back is Legitimate
If you’re prepared to attack back, you need to be able to hit the other side harder than they hit you, and you always have to be ready to be hit with the best you have got. Transfer this away from Chicago crime bosses and the law and into the world of cybersecurity, and you have a case of attackers and defenders. Yet there are rare examples of those being attacked actually taking the fight back to the attacker.
The UK Cybersecurity Strategy: How it Measures Up
The new UK cybersecurity strategy has, generally, been welcomed since it was announced in November 2016. However, will it really be able to measure the countless different factors that make up cyber-threats?
Trump's White House: What Now for Cybersecurity?
Cybersecurity came to the fore in this presidential race like never before, but many question Donald Trump’s tech credentials going forward. Phil Muncaster investigates…
The Risk Avengers
What do you get when you combine three talented and experienced cybersecurity professionals? Eleanor Dallaway met The Risk Avengers and found out
Medical Devices Need a Strong Dose of Cybersecurity
Technical innovations in the industry – the increasing adoption of electronic health records combined with an ever-increasing network of medical devices, healthcare apps and wearables –open up even more avenues for cyber-criminals to gain unauthorized access to sensitive data.