Infosecurity Magazine Features

  1. Keeping Software Defined Data Centers Secure

    Companies take all the aspects of an SDDC and think that everything has to be implemented at once.

  2. Managing the Mobile Gap

    "The frequency of updates is unparalleled. There have been 14 versions of iOS in the past year. And if you look at apps, every app update is a new app, every OS update is a new OS. And there are undocumented features with every update."

    1. Photo of Stephen Pritchard

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

  3. Cyber-Psychology: The Key to Securing the Human Element in Your Organization

    Cyber-psychology as a discipline is concerned with the interaction of the mind and behavior with various forms of information communication technology. Not only email, the internet and social media, but also virtual reality, gaming and smart devices.

    1. Photo of Ciarán McMahon

      Ciarán McMahon

      Psychologist

  4. Eyes on the Target

    The threat vector that we’re seeing are the same ones that you’re seeing frankly all over the news.

  5. Cybersecurity and the next POTUS

    Security is always going to play a big part in any political race in America.

    1. Kathryn Pick

      Technology Writer

  6. Checking the NHS’s Security Pulse

    Managing 40,000 devices across 500 sites is a huge challenge for any organization. But in the health sector added, mandatory security concerns make this even harder.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  7. Penetrating the IT Dark Cloud

    Cloud apps are revolutionizing enterprise IT, and their usage only continues to expand as businesses deploy them at a rapid pace. However, they also pose their own set of security risks

    1. Photo of Aditya K Sood

      Aditya K Sood

      Chief Architect of Cloud Threat Labs, Elastica

  8. Security’s Ever-Growing, Ever-Moving Target

    Portable platforms increasingly form the cornerstone of enterprises’ long-term strategic aims to be more flexible and agile. But how is security developing to prevent more threat vectors from being introduced?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  9. Hacking the Cheaters

    What does the Ashley Madison incident says about security and privacy in 2015

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  10. When Outsiders Become Insiders

    Abuse of privileged access to systems is a growing cyber-threat, presenting an easier way in for hackers in many cases than traditional brute force attacks

    1. Photo of Stephen Pritchard

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

  11. Health, Safety and Security

    Forget the bond of doctor-patient confidentiality, cyber-attacks pose a much bigger threat to your sensitive medical data, finds Wendy M. Grossman as she assesses the recent spate of healthcare breaches

    1. Wendy M. Grossman

      Contributing Writer

  12. Securing the Smart City

    The smart city has long been the realm of science fiction. However, as dark fiber, big data and the internet of things start to converge, the reality is not as distant as it seems. But what are the security implications? Davey Winder investigates

    1. Davey Winder

  13. Information Sharing: Better Together

    Information sharing can be a win-win for public and private sectors, Phil Muncaster discovers, but there are still hurdles to overcome

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  14. NSA: Business as Usual

    The NSA has experienced its biggest legislative setback in nearly 40 years – but there’s a fishy smell to it, reports Danny Bradbury

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  15. Windows Server 2003: End of the Road

    It’s the end of Windows Server 2003 as we know it. Do you feel fine? asks Johna Till Johnson

    1. Photo of Johna Till Johnson

      Johna Till Johnson

      Contributing Writer

  16. Tales from the Crypt: Hardware vs Software

    Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various solutions on offer

    1. Photo of Daniel Brecht

      Daniel Brecht

      Contributing Writer

  17. The Rising Cost of Cyber-Insurance

    You can insure yourself against cyber-attack, says Danny Bradbury, but be warned, prices are going up

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  18. Cybersecurity from Capitol Hill to Whitehall

    Proclamations on cybersecurity and government surveillance have ignited political discourse in early 2015. Wendy M. Grossman cuts through the spin to find out what this means for technologists and citizens

    1. Wendy M. Grossman

      Contributing Writer

  19. Lizard Squad: Original Pranksters

    Whether meddling kids or a serious menace, Lizard Squad is part of a phenomenon that is here to stay

    1. Photo of Fahmida  Y. Rashid

      Fahmida Y. Rashid

      Reporter, Infosecurity Magazine

  20. Google vs Microsoft: Let the Patch Wars Commence

    Phil Muncaster investigates whether an ongoing dispute between Google and Microsoft could change the way we fix security flaws in the future

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?