Infosecurity News Features

  1. Identifying the Problem of Disruption

    Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  2. All At Sea

    Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  3. #WIREDSecurity: The Best Bits

    WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. CREST Workshop Gathers to Tackle Gender Gap in InfoSec

    It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. #Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

    Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. Almost a Third of Staff Still Fall for Phishing Emails

    Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

    At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

    At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. We’re Vulnerable to Attack, Say 89% of UK Organizations

    Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Harsh Lessons Learned by Linkedin

    A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.

  11. Human Error Considered Biggest Security Threat to Orgs, New Study Finds

    NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Microsoft Using Machine Learning to Strengthen Security

    Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Techniques of Cyber-Criminals Continue to Evolve

    New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

    The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Will the £35K Rule Hit the Security Industry?

    As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.

    1. Photo of Victoria Sharkey

      Victoria Sharkey

      Partner, Medivisas

  16. CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?

    Toby Stevens, Director of Enterprise Privacy Group, discusses the role that ethics play in privacy and the importance for security professionals to act and work ‘ethically’.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. How to DCEPT your Attackers

    A look at the “open source honeytoken tripwire” DCEPT from Dell Secureworks

  18. Australian Orgs Will Struggle with Data Breach Bill

    Consulting firm Protiviti has predicted Australian companies will face confusion when complying with the Federal Government’s mandatory data breach notification proposals

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. #RSAC: CSI:Cyber Panel Aims to Please Critics

    Despite CSI:Cyber receiving unpopular reviews from the security community, it has been renewed for a second series and this week at RSA Conference in San Francisco, two members of the cast and its creator took centre stage in the keynote theater.

  20. Ransomware: Prevention vs Cure

    Can a focus on vigilance prevent cyber extortion, or is prioritizing a strong recovery plan the way forward?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?