Infosecurity News Features

  1. The Battle for Cybersecurity Talent in America: East Coast vs. West Coast

    Infosecurity Magazine explores the theory that all good cybersecurity talent migrates to the West Coast of America...

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  2. Two Weeks Before WannaCry: Surviving a Zero-Day Ransomware Attack

    There are many factors that can be gained from this experience, not least realizing how capable the attackers were

  3. Skills Shortage Includes a Lack of Teachers

    Lochgelly High School sent out a letter to parents stating they will be unable to teach computing to pupils after the only ‘capable’ teacher left for another school

  4. Cybersecurity Behind the Scenes at Wimbledon

    Eleanor Dallaway investigates how IBM secures Wimbledon, one of the world's most popular sporting events

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  5. Flash Enters Final Three Years as Adobe Pulls Support Plug

    Adobe announced this week that it plans to bring down the curtain on the Flash Player in three years.

  6. Alpha Bay Takedown Shows Government Collaboration Capability

    Described as “roughly ten times the size” of the Silk Road, the dark web market Alpha Bay has been taken down in a joint effort between international law enforcement, US government departments and Europol.

  7. Are Cybersecurity Companies Compatible with the Cloud?

    Dan Raywood talks to CloudShare’s VP R&D, Muly Gottlieb, about the battle between cloud and security

  8. #EuroCACS: Where Awareness and Learning are King

    One of the main themes appeared to be that of incident response, and security awareness

  9. GDPR: One Year and Counting

    Today marks exactly 12 months until the European GDPR comes into effect and with just a year to go it’s now imperative that companies of all sizes are fully focused on getting their houses in order

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. All You Need to Know about the Cyber Retraining Academy

    The Cyber Retraining Academy is an HM Government program delivered in partnership with SANS to address the cybersecurity skills gap

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  11. Will Vault7 Shake Infosec Like Snowden?

    The Wikileaks ‘Vault7’ release earlier this month reignited the reality of state-sponsored espionage, and what our governments know about us

  12. Security Certifications are Useless, Right?

    How many security jobs have you seen recently that said “CISSP not required, we don’t care what level of education you’ve attained, we just care that you’re super smart at security”?

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  13. ACE Skills Learned & on Display

    Teams were information security professionals working for a fictional power company ‘Transcorp’ which had been taken over, and it was the job of the teams to use their skills to take back the network

  14. Neurodiversity & Cybersecurity Careers: Recruiting & Retaining Autistic Cybersecurity Professionals

    At the Defence Academy of the United Kingdom on March 2 2017, many relevant parties gathered to discuss neurodiversity and careers in cybersecurity

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  15. Detect, Protect and Survive

    Incident response has become one of those areas of cybersecurity that people think they could do better, but how often do they test it and how well could they actually act in the event of an incident occurring?

  16. Help Save the Youth of Cyber

    The news over the weekend was full of stories about how the youth of the UK was going to be taught cyber skills.

  17. Password Managers - Resolution to Authentication Headaches

    “Password managers are a good thing” as they give “huge advantages in a world where there's far too many passwords for anyone to remember”

  18. Identifying the Problem of Disruption

    Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  19. All At Sea

    Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  20. #WIREDSecurity: The Best Bits

    WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?