Infosecurity News Features

  1. Demystifying the CISO: A Guide to Cybersecurity Leadership

    Understanding the role, responsibilities and essential skills of the CISO

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  2. You're Hired! The Truth About Certifications in Cybersecurity Careers

    Certifications still matter in the cybersecurity job market, but skills seal the deal

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  3. Top 10 Cyber-Attacks of 2024

    High-profile cyber-attacks in 2024 have hit healthcare services and compromised sensitive systems and data of governments and critical infrastructure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. Cybersecurity M&A Roundup: CrowdStrike Announces New Acquisition

    CrowdStrike has reached a deal to acquire Adaptive Shield, while Cybereason and Trustwave have entered into a definitive merger agreement

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. Cybersecurity M&A Roundup: Sophos to Buy Secureworks, Proofpoint Makes Acquisition

    Sophos reached an agreement to acquire Secureworks for $859m in a busy October for M&A deals

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. How Belgium's Leonidas Project Boosts National Cyber Resilience

    A representative of Belgium’s national cybersecurity agency shared his experience with the Leonidas project, a cyber protection initiative started after the Russian invasion of Ukraine

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  7. #CyberMonth: How Security Champions Programs Lead to Cultural Transformation

    Security champions programs can have a significant impact on an organization’s cybersecurity culture, but only with the right planning and support mechanisms in place

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. #CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals

    Infosecurity explores the role of software updates in cybersecurity and how to prevent them from being the cause of security disasters

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  9. #CyberMonth: How to Protect Your Digital Life, Six Ways to Stay Safe Online

    Online threats are surging. That’s bad news for consumers living in an increasingly digital world

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  10. Cybersecurity M&A Roundup: MasterCard and Visa Announce Cybersecurity Acquisitions

    Several large global companies announced cybersecurity capabilities through acquisitions in September, including Visa, Mastercard and Airbus

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. #CyberMonth: How to Outsmart Novel Phishing Tactics and Techniques

    New social engineering tactics are testing network defenders to their limits

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  12. Beyond Disclosure: Transforming Vulnerability Data Into Actionable Security

    CISA is shifting from focusing on getting more vulnerability disclosures to providing better data on the disclosed vulnerabilities for more actionable security processes

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  13. Cybersecurity M&A Roundup: CheckPoint Boosts SOC Offering with Cyberint

    Mimecast made a second acquisition in two months, and threat intelligence provider Cyberint joined CheckPoint

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  14. From Protests to Profit: Why Hacktivists Are Joining the Ransomware Ranks

    Infosecurity explores why hacktivists are embracing ransomware and collaborating more with financially motivated cybercriminal groups

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  15. Post-Compromise Security: What to do When the Hackers Get in

    Attackers are engaging in extensive post-compromise activity and organizations need to place a greater focus on this aspect of their cybersecurity

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. Cybersecurity M&A Roundup: Google’s $23bn Wiz Takeover Falls Through

    Google’s proposed $23bn deal to acquire Wiz hit the headlines in July, while KnowBe4 and Mimecast made new acquisitions

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. Cybersecurity M&A Roundup: Private Equity Firms Expand Market Presence

    A number of major cybersecurity vendors expanded their market presence through M&A deals in May and June 2024, alongside growing investment from private equity firms

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. How to Respond Effectively During a Ransomware Attack

    Infosecurity joined a Secureworks ransomware simulation to find out some of most important approaches to responding during a ransomware incident that has taken down crucial network infrastructure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  19. Cyber Threat Intelligence Pros Assess AI Threat Technology Readiness Levels

    Infosecurity asked threat intelligence professionals which AI-powered cyber threats are being actively exploited, those likely to emerge in the near future and ones that remain potential threats

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?