Infosecurity News Features

  1. The US Government’s Open Source Security Policy Discussed

    Camille Stewart Gloster and Anjana Rajan from the ONCD discuss how the federal government plans to help enhance security in open source software

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits

    Or Yair, a SafeBreach security researcher, developed a proof of concept to create a next-gen wiper using EDR tools to wipe files

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  3. January's M&A News Roundup

    Cybersecurity buyers and sellers remained cagey regarding January’s deals

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  4. #DataPrivacyWeek: Addressing ChatGPT's Shortfalls in Data Protection Law Compliance

    OpenAI needs to better address whether its language model ChatGPT is compliant with data protection regulations across the world, experts say

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  5. #DataPrivacyWeek: ChatGPT's Data-Scraping Model Under Scrutiny From Privacy Experts

    OpenAI’s latest large language model raises significant privacy issues that need to be addressed, experts say

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. #DataPrivacyWeek: How to Respond to Changing Consumer Data Privacy Expectations

    Infosecurity speaks to leading experts about how organizations should adapt their privacy strategies to changing consumer expectations

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. MFA Bypass: The Next Frontline for Security Pros

    MFA has long been recommended by governments and industry bodies, but cyber-criminals are searching for ways to turn this security strength into a weakness

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. The LastPass Breaches: Password Managers in the Spotlight

    What do the recent LastPass breaches mean for the use of password managers in the future

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Top 10: The Biggest Cybersecurity Deals of 2022

    In 2022, the 10 most lucrative cybersecurity deals happened in the US

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  10. December's M&A News Roundup

    Although December saw a few significant deals in the cybersecurity industry, buyers and sellers remained cagey regarding the money involved

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  11. Lessons Learned: The Log4J Vulnerability 12 Months On

    Infosecurity spoke to cybersecurity professionals about the state of the Log4j vulnerability 12 months since it was made public

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  12. Top Cybersecurity Lessons from 2022 for Security Teams – Part 2

    Part 2 of Infosecurity's list of the top cybersecurity lessons organizations should take from 2022

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Top Cybersecurity Lessons from 2022 for Security Teams – Part 1

    Infosecurity provides the first part of its list of the top cybersecurity lessons security teams should take from 2022

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. Data Reform Bill: Experts Criticize the UK's GDPR Replacement

    The UK government aims to remove GDPR red tape, but the proposed bill has been heavily criticized by some experts

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  15. Locked Shields: Preparing for Cyber Warfare

    Against a backdrop of war in Europe, NATO’s annual ‘Locked Shields’ cyber exercise took on extra importance in 2022

    1. Photo of Gerrard  Cowan

      Gerrard Cowan

      Freelance Journalist and Editor

  16. Tackling the Scourge of Malicious Streaming Sites During this Year’s FIFA World Cup

    Cyber-criminals are using the lure of streaming World Cup matches to steal data and install malware

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. November’s M&A News Roundup

    November saw several notable M&A deals announced, including those involving Intel471, Orange Cyberdefense and Palo Alto Networks

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. How to Maintain Strong Cybersecurity in the Face of Economic Headwinds

    Cybersecurity professionals share their advice on how to maintain strong cybersecurity against economic pressures

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  19. Fighting Disinformation with Technology: Three Blueprints for a More Trustable Internet

    As social media platforms are failing to tackle the spread of misinformation and disinformation, some are turning to emerging technologies to build a more trustable internet

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  20. TikTok's and Reddit's Security Shortcomings Could Lead to Disinformation, Study Shows

    Cybersecurity firm Cerby found that users of the two social media platforms are offered poor security controls that leave them susceptible to credential reuse attacks

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?