Infosecurity Magazine Features
Top 10: Cyber-Secure Countries
What are the most cyber-secure countries to date?
Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t
Ira Winkler believes you should attribute appropriate blame and penalties to users in cases of clear negligence while Wendy Nather argues this approach is counterproductive
Ask The Experts: How to Stay on Top of Cyber-Hygiene
Three security experts advise how to develop a continuous cyber-hygiene plan for your organization
Cyber Start-ups: How to Get Off the Ground and into the Stratosphere
Phil Muncaster investigates how to make it big in a sector already worth billions
Dissecting the UK’s New IoT Security Bill
The UK’s new PSTI Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?
How not to Pay a Ransomware Demand
Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand
Securing Smart Cities From Ransomware Crooks
Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution
Cybersecurity's Image Problem
Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how we can fix them
Diversifying Cyber: A Focus on Neurodiversity and Physical Disability
James Coker takes a deep dive into the NCSC’s recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber
The Security Challenge of the Century: Security in the Metaverse
Kate O'Flaherty considers the security challenges in the metaverse and investigates how they can be resolved
Stamping Out CSAM With Machine Learning?
If the question is how to control harmful content, Davey Winder considers whether the answer is machine learning?
Top 10: Cryptocurrency Heists
What are the largest recorded cryptocurrency thefts to date?
Cryptojacking: What’s New in the World of Resource Hijacking?
Phil Muncaster discovers that a combination of surging crypto prices and the pandemic have given cyber-criminals a shot in the arm
Ask the Experts: How to Ensure Your Cybersecurity Keeps Pace With Advances in Tech
Three security experts discuss how businesses can prepare themselves for major changes in the tech landscape
The Impact of Emerging Technology on the Future of Cybersecurity
Benjamin David examines the potential future impact - both good and bad - of emerging technologies
Defense in Depth? An Up-Close Look at the CMMC
Danny Bradbury looks at the impact of CMMC so far and questions whether it needs to adapt
Sharing is Caring: Using Intelligence to Fight Cybercrime
James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice
AI: End of the SOC as We Know It vs. A SOC That's Staying Put
Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant
Tales From the Meeting Room: Cyber’s Sexism Challenge
James Coker explores the scale of sexist behaviors in meetings in the cyber industry
Infosec Rock Stars: The Sham, The Myth, The Legends
Eleanor Dallaway unpacks the infosec industry's obsession with fame