Infosecurity News Features
June M&A News Roundup
Several M&A deals in June 2023 focused on the expansion of AI capabilities in cybersecurity
April-May M&A News Roundup
Big tech and cybersecurity companies were involved in mergers and acquisitions in April and May 2023, including IBM and Akamai
Four Key GDPR Trends on the Law’s Fifth Anniversary
Regulators and businesses must prepare for a number of trends regarding the GDPR in the coming years
Massive Adoption of Generative AI Accelerates Regulation Plans
The explosion in the use of generative AI models like ChatGPT, and the threats they pose, have urged governments to adapt and speed up AI regulation efforts
#WorldPasswordDay: Confusion over Password Advice Adds to Top Security Risks for Organizations
The plethora of recommendations around password practices is causing confusion and stress for users
Reining in the Fraudsters: Policing Scam Websites
Law enforcement and domain registry organizations are ramping up efforts to tackle online fraud, but threat actors are adapting their approaches
Replacing GDPR in the UK: Assessing AI and Research Provisions
The UK government’s proposed updates and amendments to the GDPR could have significant implications for the use of AI and conducting research
Replacing GDPR in the UK: A Cost-Benefit Analysis
The UK’s proposed amendments to the GDPR have stirred significant debate, and Infosecurity investigates the potential implications of this divergence
March’s M&A News Roundup
In March 2023, there were M&A announcements involving big-name cybersecurity companies Rapid7, Cisco and Logpoint
Threat Intelligence: The Role of Nation-States in Attributing Cyber-Attacks
While Ukraine and its Western allies are increasingly using cyber attribution as a geopolitical tool, many experts claim that it’s limited until an international legal ground has been found
Cyber-Attacks in the Media Industry Making Headlines
Why are media organizations so vulnerable to cyber-attacks?
Threat Intelligence: Do We Need A 'Rosetta Stone' of Cyber Attribution?
Threat groups are tracked under many different names, and there are good reasons for that
Unpacking Recent Government TikTok Bans
TikTok's data practices are coming under growing scrutiny in the Western world, leading to bans on using the app in governments
February's M&A News Roundup
Buyers and sellers from the cybersecurity industry were once again reluctant to share financial terms regarding February’s deals
Threat intelligence: Why Attributing Cyber-Attacks Matters
While cyber attribution has become much more challenging with the emergence of cybercrime-as-a-service, threat intelligence analysts argue it is still valuable to anticipate future attacks
Cyber Sanctions: An Effective Weapon or Just Posturing?
Cyber sanctions are increasingly used by governments in response to cybercrime, but are they having the desired effect?
Russia-Ukraine: New Norms in Cyber Warfare Emerging
Defence and cybersecurity analysts consider the cybersecurity implications the conflict and why cyber-Armageddon has not yet been realized
The US Government’s Open Source Security Policy Discussed
Camille Stewart Gloster and Anjana Rajan from the ONCD discuss how the federal government plans to help enhance security in open source software
Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits
Or Yair, a SafeBreach security researcher, developed a proof of concept to create a next-gen wiper using EDR tools to wipe files
January's M&A News Roundup
Cybersecurity buyers and sellers remained cagey regarding January’s deals