Infosecurity News Features

  1. How to Mitigate the Impact of Cyber Staff Absences During the Summer Break

    Four additional steps organizations can take to limit the extra vulnerabilities caused by increased fluctuations in security staff during the summer

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. July M&A News Roundup

    Tech giants Cisco and Thales announced agreements for cybersecurity acquisitions in July 2023

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Angoka: UK's Most Innovative Cyber SME on a Mission to Secure Smart Mobility

    The machine-to-machine communications security provider is involved in various government-funded smart mobility projects across the UK

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  4. June M&A News Roundup

    Several M&A deals in June 2023 focused on the expansion of AI capabilities in cybersecurity

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. April-May M&A News Roundup

    Big tech and cybersecurity companies were involved in mergers and acquisitions in April and May 2023, including IBM and Akamai

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. Four Key GDPR Trends on the Law’s Fifth Anniversary

    Regulators and businesses must prepare for a number of trends regarding the GDPR in the coming years

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. Massive Adoption of Generative AI Accelerates Regulation Plans

    The explosion in the use of generative AI models like ChatGPT, and the threats they pose, have urged governments to adapt and speed up AI regulation efforts

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  8. #WorldPasswordDay: Confusion over Password Advice Adds to Top Security Risks for Organizations

    The plethora of recommendations around password practices is causing confusion and stress for users

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Reining in the Fraudsters: Policing Scam Websites

    Law enforcement and domain registry organizations are ramping up efforts to tackle online fraud, but threat actors are adapting their approaches

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. Replacing GDPR in the UK: Assessing AI and Research Provisions

    The UK government’s proposed updates and amendments to the GDPR could have significant implications for the use of AI and conducting research

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. Replacing GDPR in the UK: A Cost-Benefit Analysis

    The UK’s proposed amendments to the GDPR have stirred significant debate, and Infosecurity investigates the potential implications of this divergence

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. March’s M&A News Roundup

    In March 2023, there were M&A announcements involving big-name cybersecurity companies Rapid7, Cisco and Logpoint

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

    2. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  13. Threat Intelligence: The Role of Nation-States in Attributing Cyber-Attacks

    While Ukraine and its Western allies are increasingly using cyber attribution as a geopolitical tool, many experts claim that it’s limited until an international legal ground has been found

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

    2. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  14. Cyber-Attacks in the Media Industry Making Headlines

    Why are media organizations so vulnerable to cyber-attacks?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. Threat Intelligence: Do We Need A 'Rosetta Stone' of Cyber Attribution?

    Threat groups are tracked under many different names, and there are good reasons for that

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  16. Unpacking Recent Government TikTok Bans

    TikTok's data practices are coming under growing scrutiny in the Western world, leading to bans on using the app in governments

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. February's M&A News Roundup

    Buyers and sellers from the cybersecurity industry were once again reluctant to share financial terms regarding February’s deals

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  18. Threat intelligence: Why Attributing Cyber-Attacks Matters

    While cyber attribution has become much more challenging with the emergence of cybercrime-as-a-service, threat intelligence analysts argue it is still valuable to anticipate future attacks

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  19. Cyber Sanctions: An Effective Weapon or Just Posturing?

    Cyber sanctions are increasingly used by governments in response to cybercrime, but are they having the desired effect?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. Russia-Ukraine: New Norms in Cyber Warfare Emerging

    Defence and cybersecurity analysts consider the cybersecurity implications the conflict and why cyber-Armageddon has not yet been realized

    1. Photo of Gerrard  Cowan

      Gerrard Cowan

      Freelance Journalist and Editor

What’s hot on Infosecurity Magazine?