Infosecurity Magazine Features

  1. Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

    We’re all looking for the next great threat to infrastructure, but there is still a host of simple attacks we should be guarding against, says Rene Millman

    1. Rene Millman

      Contributing Writer

  2. The Cyber-Threat of Things

    There is an increasing landscape of risks facing well-connected businesses, and security practitioners must act now to mitigate them, explains Wendy M. Grossman

    1. Wendy M. Grossman

      Contributing Writer

  3. Computer Says “No”: Will We Ever be Rid of DDoS Attacks?

    With DDoS attacks reportedly increasing in size and complexity in 2014, Phil Muncaster canvasses the industry on where the problems lie and how we can respond

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  4. A Higher Law

    It is not wisdom, but authority, that makes a law, the saying goes. Perhaps that’s why international cybersecurity laws are so lacking, says Danny Bradbury

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  5. Cryptowars 2.0 and the Path to Ubiquitous Encryption

    As government and technology companies square up once again over encryption, Tom Fox-Brewster reports from the frontline of the Cryptowars’ second coming

    1. Tom Brewster

      Contributing Writer

  6. When Good Hacks Go Bad

    The past year brought greater mainstream press interest in cybersecurity matters than ever before. But despite the wider profile of security issues, the important messages still aren’t getting across, Mike Hine discovers

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  7. Phish Your Own Staff: Arming Employees to Beat Modern Attacks

    Social engineering has long been the preferred route for hackers, whether through the front door or using social media and email. So what better way to protect against the threat than with a bit of ‘social pen-testing’? Davey Winder reports

    1. Davey Winder

  8. Outsourcing: When to DIY and When to Call a Consultancy

    To outsource or not to outsource: that is the question that has been facing CISOs the world over since the dawn of time, and the question that Phil Muncaster puts to information security experts

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  9. Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games

    The global video game market just topped $100bn in value, and cyber-criminals want a piece of it. Danny Bradbury finds out how they operate

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  10. Cyber-Warfare: Who’s Afraid of the Big Red Button?

    If current online skirmishes can’t be branded ‘war’, how soon before a major global conflict unfolds, asks Tom Brewster.

    1. Tom Brewster

      Contributing Writer

  11. A Troubled Marriage: Can Security and Privacy Happily Co-Exist in the Enterprise?

    Wendy M. Grossman examines why security and privacy find it so hard to live together in the corporate world

    1. Wendy M. Grossman

      Contributing Writer

  12. The Merchant of Malware

    The Obama Administration recently released some details on its decision-making process for publicly disclosing zero-day vulnerabilities. Drew Amorosi reports.

    1. Photo of Drew Amorosi

      Drew Amorosi

      Deputy Editor, Infosecurity Magazine

  13. Sizing Up the Tools of the Trade

    The (ISC)² US Government Advisory Board Executive Writers Bureau (EWB) looks to help CISOs and their counterparts identify cost-effective approaches amidst the soaring price of cybersecurity tools.

    1. Lou Magnotti

      U.S. Government Advisory Board Writers Bureau, (ISC)²

  14. Navigating the Potential Windows XP Apocalypse

    To upgrade, or not to upgrade? It’s a question that each organization must grapple with. Yet, not all environments lend themselves to a move away from Windows XP. Wendy M. Grossman surveys the peril.

    1. Wendy M. Grossman

      Contributing Writer

  15. Cybercrime and Punishment

    We all know the fight against cybercrime is an uphill battle, as Kevin Townsend explains. In the end, he finds, the solution may be a change in both legal and social policies.

  16. A Tale of Heartbleed

    What some call the worst bug in history is only a few months old. Danny Bradbury asks: Do you really think Heartbleed is over?

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  17. Beware of the Software Pirates

    Legendary pirates of the seas were rather good at clandestine attacks.

    1. Tom Brewster

      Contributing Writer

  18. The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call

    Infosecurity speaks to a range of industry experts about the 1.2bn password breach and the implications for website security.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  19. Tales of the Cyber Underground: Inside the Underground Ransomware Market

    With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment

  20. Navigating the Regulatory Waters of Information Security

    Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene

What’s hot on Infosecurity Magazine?