Infosecurity Magazine Features

  1. Profile Interview: Tom Kellerman

    Eleanor Dallaway had the pleasure of meeting Tom Kellerman, a man whose psyche is utterly immersed in security, both physical and cyber

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  2. The Stress of Security Leadership

    Kathryn Pick explores the growing impact of stress, burnout and anxiety on security leaders across the industry

    1. Kathryn Pick

      Technology Writer

  3. How Confusion Reigned for Thomas Cook Users

    Following the liquidation of Thomas Cook in September, fraudsters were quick to take advantage through social engineering scams, with legitimate banks adding uncertainty to the issue soon after

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  4. Q&A: Bruce Hallas

    Q&A with human factor and awareness specialist Bruce Hallas

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. What’s the Deal With DNS?

    An often overlooked but foundational layer of the internet may hold the answer to improved threat defense. Phil Muncaster finds out more

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  6. PSD2: Why Security Practices Now Matter to Payment Standards

    The PSD2 has been delayed, but is the world ready for the payment standard?

  7. Responsible Disclosure: Navigating the Vulnerability Landscape

    The ins and outs of vulnerability disclosure, and shining a light on the intricate process of flaw finding

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  8. Top Ten Tips for Efficient and Secure Backups

    How can you backup effectively and do so to a state whereby you can recover, and then begin working again?

  9. Profile Interview: Troy Hunt

    Michael Hill meets HaveIBeenPwned? founder Troy Hunt to hear the story of his journey from sports-loving youngster to tech luminary

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. The Evolution of Fraud

    With business email compromise, click farms, synthetic identities, and omnichannel attacks, the pickings for fraudsters have never been richer

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  11. The Huawei Story: An Analysis

    Reflecting on the ongoing dispute between the US and the Chinese telecoms company Huawei, and what the future might have in store

    1. Photo of Kacy Zurkus

      Kacy Zurkus

      News Writer

  12. Not All Fun & Games: Cybercrime & the Gaming Industry

    Michael Hill investigates how and why the video gaming industry has become an attractive target for cybercrime

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Top Ten Tips for Enhancing Your Career

    Is there enough opportunity for people considering a career change to get into cybersecurity from other sectors?

  14. Q&A: Bobbie Stempfley

    Bobbie Stempfley talks about her likes and loves in her cybersecurity career

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Staff Phishing Testing: Raising Awareness vs a Failing Concept

    Two experts discuss the pros and cons of phishing simulation testing

    1. Photo of Ben Oster

      Ben Oster

      Senior Product Manager, WatchGuard Technologies

  16. Mergers and Acquisitions: Potential Poisoned Chalices

    Why the merger and acquisition process can be rife with security risks and challenges

    1. Davey Winder

  17. Q&A: Thom Langford

    Thom Langford sheds light on his path into the cybersecurity industry, security misconceptions and his favorite books

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Credential Stuffing: Cracking Open Accounts with Stolen Data

    As breached data continues to flood the dark web, what can organizations can do to mitigate the impact of automated attacks

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  19. Profile Interview: Ken Munro

    From till tampering to re-defining security standards in IoT and smart devices, Ken Munro tells Michael Hill how he came to lead a team of expert UK pen testers

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. Neurodiversity in the Cybersecurity Industry

    Kathryn Pick examines the role neurodiverse individuals can play in closing the cyber skills gap

    1. Kathryn Pick

      Technology Writer

What’s hot on Infosecurity Magazine?