Infosecurity News Features

  1. #RSAC: Innovation Sandbox Presents Ten of the Best

    The ‘Innovation Sandbox’, the process sees vendors enter and be reduced down to a final ten, who get the pleasure of presenting three minute pitches to a panel of judges

  2. TEISS: Cybersecurity Can Learn from International Crisis Management

    The cyber industry can take lessons from the wider spectrum of crisis management and response, such as the aftermath of natural disasters and worldwide epidemics

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Do CIOs Underestimate Cyber Breach Recovery?

    Report by Carbon Black finds 28% of UK CIOs are ‘not concerned’ by data breach remediation

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. Google Voices Support for Apple, but what Does the FBI Actually Want?

    As the aftermath of the San Bernardino gunmen case rumbles on the CEO of Google has spoken in support of Apple - but there is disagreement across the industry about what the FBI has actually asked for

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Is 2016 the Year Data Privacy Finally Gets the Attention it Deserves?

    Today is Data Privacy Day (DPD) – but with the best will in the world, these awareness raising initiatives have had limited success in the past.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  6. Now Microsoft says get off old IE versions, as it's pulling the plug on support

    Microsoft will end support for all older versions of Internet Explorer from Tuesday 12th January. How will this impact businesses?

  7. Security Headlines Present Little Christmas Cheer

    A look back at the headlines over the Christmas period, in the best and worst instances of information security.

  8. GDPR Passes the Security Test

    The EU Parliament and Council have agreed on a text for the long-awaited General Data Protection Regulation, and it has been greeted with positive appraisal from security experts.

  9. Six Months Later, Find Out If The OPM Breach Affected You

    News appeared last week that more than a million American victims of the Office of Personnel Management (OPM) hack had not been notified that they were involved.

  10. Keeping Software Defined Datacenters Secure

    Anyone who has been paying attention to current thought around datacenter design will be aware of the increasing trend towards a software defined datacenter (SDDC). But in the same way that cloud was, initially at least, seen as insecure, does running an SDDC mean that an organization is more at risk?

  11. Predictions for 2016

    2015 - what a year it was. But what will the coming twelve months likely bring for the security industry?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  12. UK General Election 2015: What the Major Parties Promise on Security

    With just a week to go until polling day, Infosecurity takes a look at what the major contenders in the UK’s general election pledge on cybersecurity and technology

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  13. Webinar Report: Anti-Encryption Comments from Authorities Branded Unrealistic by Security Experts

    Business implications of banning encryption make the idea absurd, panelists argue

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  14. Ten Years of White Hat Ball: The Difference a Decade Makes

    As the White Hat Ball prepares to celebrate its tenth anniversary, Eleanor Dallaway takes a look back at the highlights and successes from the past ten years, and learns what a difference a decade can make

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  15. 2015 Industry Predictions Part 3: Defense, Response, Collaboration

    In the final part of Infosecurity's 2015 forecast, industry officials prophesy developments in the field of threat response and detection

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  16. 2015 Industry Predictions Part 2: The Escalating Threats

    Infosecurity's predictions series continues as industry insiders deliver their thoughts on the developing threat landscape

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  17. 2015 Industry Predictions Part 1: The Recurring Themes

    The infosec industry looks ahead to 2015, beginning with the continued persistence of known threats

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  18. Information Security Industry Shellshocked: Why Did Bash Catch Us by Surprise?

    Last week the information security world was rocked yet again by a major vulnerability in a little known piece of software that could have severe ramifications on the security of large swathes of the internet.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  19. BlackHat 2014: Businesses Look to NIST Risk Management Framework in Bid to Improve Security Posture

    The recently released Risk Management Framework from the National Institute for Standards and Technology outlines what organizations need to do to improve their information security posture against serious attacks.

    1. Photo of Fahmida  Y. Rashid

      Fahmida Y. Rashid

      Reporter, Infosecurity Magazine

  20. BlackHat 2014: Incident Response Best Practice & Automation Key to Success - Bruce Schneier

    Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

    1. Photo of Fahmida  Y. Rashid

      Fahmida Y. Rashid

      Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?