Infosecurity Magazine Features
Ask the Experts: How to Create a Culture of Diversity and Inclusion
Industry experts Harman Singh, Samantha Humphries and Jennifer DeTrani discuss workplace diversity and inclusion
Profile Interview: Robert Hannigan
Former Director of GCHQ, Robert Hannigan, talks to James Coker about his days advising the Prime Minister and his passion for increasing diversity in the industry
Google's FLoC: Privacy Gone Amok?
Google’s cookie replacement, FLoC, is coming under heavy criticism from privacy experts
How Quantum Computing Could Reshape Security
A quantum future is closer than we think, but what are the implications for national and corporate security?
Ransomware: To Pay or Not to Pay? That is the Question - Counter-point
Adam Darrah believes sometimes organizations simply have no choice but to pay
Ransomware: To Pay or Not to Pay? That is the Question - Point
Brian Honan argues that it is always wrong to pay a ransom demand
Q&A: Paul Watts
Paul Watts discusses his passion for information security, industry challenges and proudest achievements
Double Trouble: How Ransomware 2.0 Puts Your Data Under Threat
Infosecurity lifts the lid on ransomware evolution and the growth of double extortion attacks
Hardening the Internet: One Security Project at a Time
The importance of securing the essential building blocks of the modern internet
Top Ten: Cybersecurity Films of All Time
Infosecurity lists its top 10 cybersecurity films
Securing Cloud Environments in Modern Organizations
Three security thought-leaders discuss best strategies for protecting the complex cloud environments of 2021
Offensive Cyber-Capabilities: How and When Should They Be Used?
As nation states increasingly look to develop cyber-offensive capabilities, Infosecurity considers the benefits and risks involved
Profile Interview: Javvad Malik
Michael Hill meets security super blogger and all-round nice guy Javvad Malik to learn how he became one of the most well-respected and genuinely liked individuals in the infosec industry
Crowdsourced Bug Bounty Programs: Security Gains Versus Potential Losses
The pros and cons of crowdsourced bug bounty efforts
Trolling, Sexual Harassment and Murder Threats: The Dark Social Web
Eleanor Dallaway investigates trolling in the infosecurity industry and discovers a more sinister culture of sexual harassment, bullying and murder threats
Q&A: Talya Parker
Talya Parker reflects on her journey into the infosec industry, career flexibility and the need for better recruitment strategies in the sector
Cybersecurity's Economic Health Post-Pandemic
How has the industry’s bottom line been impacted by COVID-19and what does the future economic health of the sector look like Infosecurity finds out
FireEye Breach: A Tipping Point in Nation State Attacks
Infosecurity assesses the impact of one of the largest state-sponsored campaigns of all time
How Threat Actors and Fake News Are Disrupting Vaccine Efforts
As COVID-19 vaccines become a reality, how can cyber-threats and misinformation disrupt their delivery?
PAM in the Enterprise: Pros Versus Cons
The benefits and drawbacks of implementing privileged access management in an organization