Infosecurity Magazine Features

  1. Europe’s New Copyright Laws: Sending Shock Waves Across the Globe

    Experts claim new directive is damaging for small websites and individual rights holders

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  2. Q&A: Rik Ferguson

    Trend Micro's Rik Ferguson talks about his career and life in cybersecurity.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. People in Security: The Weakest Link vs Innocent and On Your Team

    Are people really the weakest link in the security chain?

    1. Photo of Bruce  Hallas

      Bruce Hallas

      Author and Host, Re-thinking the Human Factor (book and podcast)

    2. Photo of Wendy Nather

      Wendy Nather

      Head of Advisory CISOs, Cisco

  4. Drive-By Download & Fileless Malware Attacks: Minimum Action, Maximum Impact

    As the prevalence of drive-by download and fileless malware attacks continues to grow, Davey Winder explores their impact and outlines strategies for defense

    1. Davey Winder

  5. Arming Law Enforcement with Industry Skills and Volunteers

    Skills shortage in law enforcement has led to more use of volunteers from inside and outside cybersecurity. What do they look for and who are the volunteers?

  6. Profile Interview: Dug Song

    Eleanor Dallaway meets Duo Security co-founder Dug Song to hear the story of his journey from liquor store worker to security pioneer. Written by Michael Hill

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. Q&A: Theresa Payton

    Talking with Theresa Payton about her career in cybersecurity

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. Top Ten Tips for Enabling BYOD

    Infosecurity brings you 10 top tips for getting BYOD to work for your organization with the least risk to your business

  9. Cool for School: Closing the Skills Gap Through the Education System

    With the cybersecurity workforce gap now estimated to be leaving the industry short of three million employees, Michael Hill investigates why the sector must invest in the education system to help solve its own problem

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Securing a Flexible Workforce: A Challenge of the Modern Workplace

    Mobile and remote working is not without its share of security challenges.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  11. The Marriott Starwood Breach: An Analysis

    Kathryn Pick looks back at the attack on the Marriott International hotel chain, one of the biggest data breaches to hit headlines in 2018.

    1. Kathryn Pick

      Technology Writer

  12. Cybersecurity Under Trump: Two Years On

    Two years into an unsettled presidency, Danny Bradbury explores why US cybersecurity still lacks leadership

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  13. Cyber Insurance: The Next Step in Cybersecurity Preparedness?

    What benefits can cyber insurance bring to businesses, and are there any downsides for those looking to invest in the new protection?

    1. Kathryn Pick

      Technology Writer

  14. Q&A: Chet Wisniewski

    Chet Wisniewski talks about his career to date working in the information security industry.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. The Printer Security Problem

    Michael Hill investigates a significant element of corporate endpoint security that is still slipping under the radar

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Putting Faith in Zero Trust

    The last couple of years have seen the zero trust concept gain fresh traction. What has driven this new interest, and is this the way that security networks should be built now?

  17. Cool Heads and Clear Minds: Getting Your Incident Response Plan Together

    In 2018, serious cyber-attacks are inevitable. As a result, effective incident response is crucial to cybersecurity readiness.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  18. Top Ten Cases of Insider Threat

    The top 10 notorious examples of when the insider threat hit big.

  19. GDPR: Six Months On

    Cordery's Jonathan Armstrong looks back at the first six months living under the GDPR, and what we've learned so far.

    1. Photo of Jonathan Armstrong

      Jonathan Armstrong

      Partner, Cordery

  20. The Dark Side of Automation

    With autonomous technology evolving quickly, Rene Millman explores whether machine learning has a dark side and asks what can happen when bots go bad

    1. Rene Millman

      Contributing Writer

What’s hot on Infosecurity Magazine?