Infosecurity Magazine Features
Profile Interview: Tom Kellerman
Eleanor Dallaway had the pleasure of meeting Tom Kellerman, a man whose psyche is utterly immersed in security, both physical and cyber
The Stress of Security Leadership
Kathryn Pick explores the growing impact of stress, burnout and anxiety on security leaders across the industry
How Confusion Reigned for Thomas Cook Users
Following the liquidation of Thomas Cook in September, fraudsters were quick to take advantage through social engineering scams, with legitimate banks adding uncertainty to the issue soon after
Q&A: Bruce Hallas
Q&A with human factor and awareness specialist Bruce Hallas
What’s the Deal With DNS?
An often overlooked but foundational layer of the internet may hold the answer to improved threat defense. Phil Muncaster finds out more
PSD2: Why Security Practices Now Matter to Payment Standards
The PSD2 has been delayed, but is the world ready for the payment standard?
Responsible Disclosure: Navigating the Vulnerability Landscape
The ins and outs of vulnerability disclosure, and shining a light on the intricate process of flaw finding
Top Ten Tips for Efficient and Secure Backups
How can you backup effectively and do so to a state whereby you can recover, and then begin working again?
Profile Interview: Troy Hunt
Michael Hill meets HaveIBeenPwned? founder Troy Hunt to hear the story of his journey from sports-loving youngster to tech luminary
The Evolution of Fraud
With business email compromise, click farms, synthetic identities, and omnichannel attacks, the pickings for fraudsters have never been richer
The Huawei Story: An Analysis
Reflecting on the ongoing dispute between the US and the Chinese telecoms company Huawei, and what the future might have in store
Not All Fun & Games: Cybercrime & the Gaming Industry
Michael Hill investigates how and why the video gaming industry has become an attractive target for cybercrime
Top Ten Tips for Enhancing Your Career
Is there enough opportunity for people considering a career change to get into cybersecurity from other sectors?
Q&A: Bobbie Stempfley
Bobbie Stempfley talks about her likes and loves in her cybersecurity career
Staff Phishing Testing: Raising Awareness vs a Failing Concept
Two experts discuss the pros and cons of phishing simulation testing
Mergers and Acquisitions: Potential Poisoned Chalices
Why the merger and acquisition process can be rife with security risks and challenges
Q&A: Thom Langford
Thom Langford sheds light on his path into the cybersecurity industry, security misconceptions and his favorite books
Credential Stuffing: Cracking Open Accounts with Stolen Data
As breached data continues to flood the dark web, what can organizations can do to mitigate the impact of automated attacks
Profile Interview: Ken Munro
From till tampering to re-defining security standards in IoT and smart devices, Ken Munro tells Michael Hill how he came to lead a team of expert UK pen testers
Neurodiversity in the Cybersecurity Industry
Kathryn Pick examines the role neurodiverse individuals can play in closing the cyber skills gap