Infosecurity Magazine Features

  1. 5 Best Practices for Mitigating DDoS Attacks

    To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  2. Ask The Experts: How To Respond to a Data Breach Effectively

    Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

    2. Photo of Heath Renfrow

      Heath Renfrow

      CISO, Conversant Group

    3. Photo of Amar Singh

      Amar Singh

      CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

  3. Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

    Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations

    1. Photo of Jordon Kelly

      Jordon Kelly

      Research Analyst, Information Security Forum

    2. Photo of Callum Roxan

      Callum Roxan

      global head of threat intelligence, F-Secure

  4. Why the Future of Cybersecurity is AI

    As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  5. Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

    Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  6. Top 5 Best Practices for Cloud Security

    Learn how to keep data safer in the cloud with these five best security practices

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  7. Biden and Cybersecurity: A Six-Month Performance Review

    Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  8. Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

    With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  9. Do We Need to Have a Security Conversation About GPT-3?

    Davey Winder explores the security and privacy issues surrounding an area of AI that is setting a marker in the tech world

    1. Davey Winder

  10. State of the Global Threat Landscape

    Benjamin David analyzes 2021’s top cyber trends and attacks across the globe

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  11. Time to Reduce Reliance on CDN Providers?

    James Coker looks at the issues surrounding the recent widespread website outages caused by an issue at CDN provider Fastly

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. R-E-S-P-E-C-T in S-E-C-U-R-I-T-Y

    Harassment has devastatingly become more endemic in the infosecurity industry, but Respect in Security aims to fetter that. Eleanor Dallaway meets with its founders to learn more

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  13. Top 10: Ransomware Payments

    What are the top 10 confirmed or widely reported ransomware payments to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. Defining Cyber-Resiliency in the Modern World

    What does it mean for organizations to be cyber-resilient in the post-COVID new dawn?

  15. Critical National Infrastructure: The Growing Threat

    CNI systems continually prove to be particularly open to attack from a variety of threat actors. Kate O’Flaherty investigates

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  16. Securing the Return to the Office Post-COVID

    James Coker looks at the potential security risks posed by staff returning to the office environment

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. Top 5 Security Considerations for Hybrid Working

    Top 5 security considerations for a securing a safe hybrid workforce

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  18. Top 10 Cybersecurity Salaries

    What are the highest paying roles in cybersecurity?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  19. The Rise of DDoS: Flooded Networks, Downtime and How to Bolster Protection

    Danny Bradbury explores the current DDoS threat backdrop and outlines where and how attackers are evolving their techniques

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  20. Top 5 Zero Trust Policies

    Five crucial role and access strategies to adopt a zero trust framework for your organization

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?