Infosecurity Magazine Features
5 Best Practices for Mitigating DDoS Attacks
To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices
Ask The Experts: How To Respond to a Data Breach Effectively
Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively
Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive
Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations
Why the Future of Cybersecurity is AI
As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence
Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR
Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR
Top 5 Best Practices for Cloud Security
Learn how to keep data safer in the cloud with these five best security practices
Biden and Cybersecurity: A Six-Month Performance Review
Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace
Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity
With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself
Do We Need to Have a Security Conversation About GPT-3?
Davey Winder explores the security and privacy issues surrounding an area of AI that is setting a marker in the tech world
State of the Global Threat Landscape
Benjamin David analyzes 2021’s top cyber trends and attacks across the globe
Time to Reduce Reliance on CDN Providers?
James Coker looks at the issues surrounding the recent widespread website outages caused by an issue at CDN provider Fastly
R-E-S-P-E-C-T in S-E-C-U-R-I-T-Y
Harassment has devastatingly become more endemic in the infosecurity industry, but Respect in Security aims to fetter that. Eleanor Dallaway meets with its founders to learn more
Top 10: Ransomware Payments
What are the top 10 confirmed or widely reported ransomware payments to date?
Defining Cyber-Resiliency in the Modern World
What does it mean for organizations to be cyber-resilient in the post-COVID new dawn?
Critical National Infrastructure: The Growing Threat
CNI systems continually prove to be particularly open to attack from a variety of threat actors. Kate O’Flaherty investigates
Securing the Return to the Office Post-COVID
James Coker looks at the potential security risks posed by staff returning to the office environment
Top 5 Security Considerations for Hybrid Working
Top 5 security considerations for a securing a safe hybrid workforce
Top 10 Cybersecurity Salaries
What are the highest paying roles in cybersecurity?
The Rise of DDoS: Flooded Networks, Downtime and How to Bolster Protection
Danny Bradbury explores the current DDoS threat backdrop and outlines where and how attackers are evolving their techniques
Top 5 Zero Trust Policies
Five crucial role and access strategies to adopt a zero trust framework for your organization