Infosecurity News Features

  1. Cybersecurity M&A Roundup: Sophos to Buy Secureworks, Proofpoint Makes Acquisition

    Sophos reached an agreement to acquire Secureworks for $859m in a busy October for M&A deals

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. How Belgium's Leonidas Project Boosts National Cyber Resilience

    A representative of Belgium’s national cybersecurity agency shared his experience with the Leonidas project, a cyber protection initiative started after the Russian invasion of Ukraine

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  3. #CyberMonth: How Security Champions Programs Lead to Cultural Transformation

    Security champions programs can have a significant impact on an organization’s cybersecurity culture, but only with the right planning and support mechanisms in place

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. #CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals

    Infosecurity explores the role of software updates in cybersecurity and how to prevent them from being the cause of security disasters

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  5. #CyberMonth: How to Protect Your Digital Life, Six Ways to Stay Safe Online

    Online threats are surging. That’s bad news for consumers living in an increasingly digital world

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  6. Cybersecurity M&A Roundup: MasterCard and Visa Announce Cybersecurity Acquisitions

    Several large global companies announced cybersecurity capabilities through acquisitions in September, including Visa, Mastercard and Airbus

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. #CyberMonth: How to Outsmart Novel Phishing Tactics and Techniques

    New social engineering tactics are testing network defenders to their limits

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  8. Beyond Disclosure: Transforming Vulnerability Data Into Actionable Security

    CISA is shifting from focusing on getting more vulnerability disclosures to providing better data on the disclosed vulnerabilities for more actionable security processes

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  9. Cybersecurity M&A Roundup: CheckPoint Boosts SOC Offering with Cyberint

    Mimecast made a second acquisition in two months, and threat intelligence provider Cyberint joined CheckPoint

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  10. From Protests to Profit: Why Hacktivists Are Joining the Ransomware Ranks

    Infosecurity explores why hacktivists are embracing ransomware and collaborating more with financially motivated cybercriminal groups

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  11. Post-Compromise Security: What to do When the Hackers Get in

    Attackers are engaging in extensive post-compromise activity and organizations need to place a greater focus on this aspect of their cybersecurity

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. Cybersecurity M&A Roundup: Google’s $23bn Wiz Takeover Falls Through

    Google’s proposed $23bn deal to acquire Wiz hit the headlines in July, while KnowBe4 and Mimecast made new acquisitions

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Cybersecurity M&A Roundup: Private Equity Firms Expand Market Presence

    A number of major cybersecurity vendors expanded their market presence through M&A deals in May and June 2024, alongside growing investment from private equity firms

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. How to Respond Effectively During a Ransomware Attack

    Infosecurity joined a Secureworks ransomware simulation to find out some of most important approaches to responding during a ransomware incident that has taken down crucial network infrastructure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. Cyber Threat Intelligence Pros Assess AI Threat Technology Readiness Levels

    Infosecurity asked threat intelligence professionals which AI-powered cyber threats are being actively exploited, those likely to emerge in the near future and ones that remain potential threats

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  16. Five Ways to Dramatically Reduce the Risk of Password Compromise

    There are a range of simple steps users can take to reduce the chances of their password being compromised, World Password Day helps get the message out loud and clear

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. Cybersecurity M&A Roundup: Darktrace to be Sold for $5.3bn, KnowBe4 Expands Portfolio

    In a bumper month for M&A deals, Thomas Bravo reached an agreement to purchase AI cybersecurity specialist Darktrace for $5.3bn

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. Hope Revived for UN Cybercrime Treaty as Negotiations Set to Resume

    The negotiations for the Russia-led resolution are on hold at the UN. Infosecurity asked cyber-geopolitics experts how it can still be a beneficial instrument in the fight against cybercrime when discussions resume

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  19. How to Discover the Right AI Cybersecurity Tools for Your Security Strategy

    AI technologies offer huge possibilities for cyber defenders, but organizations must cut through the current hype cycle to avoid being mis-sold AI-based security tools

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?