Infosecurity Magazine Features

  1. Password Meters: Up to the Job?

    Conversations about strong authentication and creating secure passwords have been persistent for many years, but are the so-called solutions actually delivering? Dan Raywood looks at the current state of password creation tools

  2. The Digital Transformation Journey: Why Security is Key

    If you want to have a modern day business ready to thrive, it has to be ready for the digital age

    1. Kathryn Pick

      Technology Writer

  3. The Top Ten Worst Vulnerabilities

    The ten worst and most impactful vulnerabilities

  4. Rethinking Recruitment: Solving the Skills Shortage Puzzle

    As cybersecurity skills shortages continue to grow, Davey Winder explores why changes in recruitment tact are urgently required

    1. Davey Winder

  5. Q&A: Tim Mackey

    Tim Mackey shares his views on security strategies, mentoring teams and traveling the world

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. Ask the Experts: How to Master Modern Mobile Security

    What three experts think are the ways to better manage mobiles securely.

    1. Photo of Anurag  Kahol

      Anurag Kahol

      CTO and co-founder, Bitglass

    2. Photo of Arun Kothanath

      Arun Kothanath

      Chief Security Strategist, Clango

  7. Profile Interview: Wendy Nather

    Michael Hill meets the fabulous Wendy Nather, a woman whose love for security is inspired by her passion for new adventures and tackling the next big challenge

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. To Sell or Not to Sell? Where Should Vendors Draw the Line?

    In the wrong hands, some tools can undermine national security and human rights

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  9. Ransomware Rennaissance: A Major Public Sector Threat for 2020

    Ransomware is on the rise again, and 2019 saw a spike in attacks targeting public sector and municipal entities

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  10. California Consumer Privacy Act: A New Dawn for Privacy Rights

    The arrival of the CCPA and what it means for the future of data protection in California

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  11. Time for Change: Has Anti-Virus Had its Day?

    What role should anti-virus play in cybersecurity policy today?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  12. Ask the Experts: How to Mitigate Phishing Threats in Your Organization

    What do our three experts think are the solutions to mitigate phishing attacks and threats?

    1. Photo of James Chappell

      James Chappell

      Co-Founder & Chief Innovation Officer, Digital Shadows

    2. Photo of Kowsik Guruswamy

      Kowsik Guruswamy

      Chief Technology Officer, Menlo Security

    3. Photo of Tim Sadler

      Tim Sadler

      CEO, Tessian

  13. The Rise of Dangerous Deepfakes

    Experts are concerned about the growing prevalence of deepfake technology and its potential to cause serious harm

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  14. Security Awareness: Driving Better Behaviors vs Still the Same Old Problems

    Is security awareness achievable? Two experts share their opposing perspectives.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  15. Soc It To ‘Em: Making a Success of a Security Operations Center

    Michael Hill outlines how to get the most out of a SOC investment

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Computer Misuse Act Conundrums

    As the Computer Misuse Act turns 30, a call for revisions to bring it up to speed with modern security research practice

  17. Q&A: Rowenna Fielding

    Rowenna Fielding is a self-confessed former IT and infosec nerd turned data protection anorak

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. The Top Ten Bug Bounty Rewards

    Infosecurity's list of the most notable and sizeable bug bounty payments

  19. Q&A: Rachel Tobac

    Rachel Tobac is a passionate social engineering expert who uses her knowledge of behaviorism to train people in information security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. Are You Afraid of the Dark(web)?

    Examining the fear factor that surrounds dark web marketplaces and whether there’s light among the nefarious bleakness

    1. Davey Winder

What’s hot on Infosecurity Magazine?