Infosecurity Magazine Features

  1. Top 10: Cyber-Secure Countries

    What are the most cyber-secure countries to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t

    Ira Winkler believes you should attribute appropriate blame and penalties to users in cases of clear negligence while Wendy Nather argues this approach is counterproductive

    1. Photo of Wendy Nather

      Wendy Nather

      Head of Advisory CISOs, Cisco

    2. Photo of Ira Winkler

      Ira Winkler

      chief security architect, Walmart

  3. Ask The Experts: How to Stay on Top of Cyber-Hygiene

    Three security experts advise how to develop a continuous cyber-hygiene plan for your organization

    1. Photo of Brad LaPorte

      Brad LaPorte

      Advisor - Lionfish Tech Advisors

    2. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

    3. Photo of Holly Grace Williams

      Holly Grace Williams

      Managing Director, AkimboCore

  4. Cyber Start-ups: How to Get Off the Ground and into the Stratosphere

    Phil Muncaster investigates how to make it big in a sector already worth billions

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  5. Dissecting the UK’s New IoT Security Bill

    The UK’s new PSTI Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. How not to Pay a Ransomware Demand

    Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand

    1. Photo of Alex Meehan

      Alex Meehan

      Technology and Features Journalist

  7. Securing Smart Cities From Ransomware Crooks

    Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  8. Cybersecurity's Image Problem

    Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how we can fix them

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  9. Diversifying Cyber: A Focus on Neurodiversity and Physical Disability

    James Coker takes a deep dive into the NCSC’s recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. The Security Challenge of the Century: Security in the Metaverse

    Kate O'Flaherty considers the security challenges in the metaverse and investigates how they can be resolved

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  11. Stamping Out CSAM With Machine Learning?

    If the question is how to control harmful content, Davey Winder considers whether the answer is machine learning?

    1. Davey Winder

  12. Top 10: Cryptocurrency Heists

    What are the largest recorded cryptocurrency thefts to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Cryptojacking: What’s New in the World of Resource Hijacking?

    Phil Muncaster discovers that a combination of surging crypto prices and the pandemic have given cyber-criminals a shot in the arm

  14. Ask the Experts: How to Ensure Your Cybersecurity Keeps Pace With Advances in Tech

    Three security experts discuss how businesses can prepare themselves for major changes in the tech landscape

    1. Photo of Brennan Baybeck

      Brennan Baybeck

      ISACA Board Director; VP & CISO for Customer Services, Oracle

    2. Photo of Paul  Holland

      Paul Holland

      Principle Research Analyst, Information Security Forum

    3. Photo of Paul McKay

      Paul McKay

      Senior Analyst, Forrester

  15. The Impact of Emerging Technology on the Future of Cybersecurity

    Benjamin David examines the potential future impact - both good and bad - of emerging technologies

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  16. Defense in Depth? An Up-Close Look at the CMMC

    Danny Bradbury looks at the impact of CMMC so far and questions whether it needs to adapt

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  17. Sharing is Caring: Using Intelligence to Fight Cybercrime

    James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. AI: End of the SOC as We Know It vs. A SOC That's Staying Put

    Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

    2. Photo of Carsten Maple

      Carsten Maple

      Professor of Cyber Systems Engineering, University of Warwick's Cyber Security Centre

  19. Tales From the Meeting Room: Cyber’s Sexism Challenge

    James Coker explores the scale of sexist behaviors in meetings in the cyber industry

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. Infosec Rock Stars: The Sham, The Myth, The Legends

    Eleanor Dallaway unpacks the infosec industry's obsession with fame

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

What’s hot on Infosecurity Magazine?