Infosecurity News Features

  1. CREST Workshop Gathers to Tackle Gender Gap in InfoSec

    It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. #Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

    Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Almost a Third of Staff Still Fall for Phishing Emails

    Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

    At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

    At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. We’re Vulnerable to Attack, Say 89% of UK Organizations

    Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. Harsh Lessons Learned by Linkedin

    A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.

  8. Human Error Considered Biggest Security Threat to Orgs, New Study Finds

    NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. Microsoft Using Machine Learning to Strengthen Security

    Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Techniques of Cyber-Criminals Continue to Evolve

    New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

    The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Will the £35K Rule Hit the Security Industry?

    As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.

    1. Photo of Victoria Sharkey

      Victoria Sharkey

      Partner, Medivisas

  13. CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?

    Toby Stevens, Director of Enterprise Privacy Group, discusses the role that ethics play in privacy and the importance for security professionals to act and work ‘ethically’.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. How to DCEPT your Attackers

    A look at the “open source honeytoken tripwire” DCEPT from Dell Secureworks

  15. Australian Orgs Will Struggle with Data Breach Bill

    Consulting firm Protiviti has predicted Australian companies will face confusion when complying with the Federal Government’s mandatory data breach notification proposals

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. #RSAC: CSI:Cyber Panel Aims to Please Critics

    Despite CSI:Cyber receiving unpopular reviews from the security community, it has been renewed for a second series and this week at RSA Conference in San Francisco, two members of the cast and its creator took centre stage in the keynote theater.

  17. Ransomware: Prevention vs Cure

    Can a focus on vigilance prevent cyber extortion, or is prioritizing a strong recovery plan the way forward?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. #RSAC: Innovation Sandbox Presents Ten of the Best

    The ‘Innovation Sandbox’, the process sees vendors enter and be reduced down to a final ten, who get the pleasure of presenting three minute pitches to a panel of judges

  19. TEISS: Cybersecurity Can Learn from International Crisis Management

    The cyber industry can take lessons from the wider spectrum of crisis management and response, such as the aftermath of natural disasters and worldwide epidemics

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. Do CIOs Underestimate Cyber Breach Recovery?

    Report by Carbon Black finds 28% of UK CIOs are ‘not concerned’ by data breach remediation

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?