Infosecurity News Features

  1. #CyberMonth: Six Cybersecurity Trends to Stay Ahead Of

    Infosecurity Magazine spoke to industry members about some of the key cybersecurity challenges to be mindful of today.

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  2. #CyberMonth: How to Promote a ‘Think Before U Click’ Culture

    Phishing remains a huge threat to organizations, and human awareness is the greatest defense

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. September's M&A News Roundup

    September 2022 was another busy moth for M&A in the cybersecurity industry

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  4. #NITAM: Preventing the Recruitment of Insider Threat Actors

    Organizations must take action to mitigate the risk of employees being recruited on behalf of cyber threat actors

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. NSO Group's Recent Difficulties Could Shape the Future of the Spyware Industry

    With a 111% surge in spyware use in the last year, many experts call for global regulations

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. Alleged TikTok Breach Could Expose Two Billion Data Records

    The Chinese social media firm claims “that the code in question is completely unrelated to TikTok’s backend source code”

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  7. Five Ways to Achieve a Successful Anti-Phishing Campaign

    Infosecurity Magazine has selected five key takeaways for a successful anti-phishing campaign from security awareness firm CybSafe’s new ebook

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  8. August’s M&A News Roundup

    August saw a number of high profile M&A updates in cybersecurity, including discussions about the acquisition of Darktrace

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Hack Backs: A Legitimate Tactic or Counter-Productive?

    Following DDoS attacks on ransomware gang LockBit, experts discuss the issues around hacking back against cyber-criminals

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. TryHackMe: The Story Behind the UK’s Most Innovative Cyber SME

    Cybersecurity training platform TryHackMe's co-founder describes the company's journey so far

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. Estonia's Battle Against a Deluge of DDoS Attacks

    The European nation has seen a spike in DDoS attacks throughout August

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  12. Analysis: Darktrace’s Potential Takeover

    What are the potential implications if the acquisition of Darktrace by Thoma Bravo goes through?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Interview: Coleen Shane - a Diverse Perspective

    Coleen Shane tells Eleanor Dallaway about her experiences as a trans woman working in cybersecurity

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  14. Digital Security by Design: A Government Strategy That Can’t Afford to Fail

    James Coker investigates the UK government-backed Digital Security by Design (DSbD) initiative

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. #MentalHealthAwarenessWeek: Supporting Cyber Workers' Mental Health More Crucial Than Ever

    The burden placed on cyber workers is becoming unmanageable, and organizations must act now

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. #WorldPasswordDay: 6 Ways Organizations Can Strengthen Employees' Password Practices

    There are various methods organizations can use to improve their employees' password practices

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. Roundtable: Experts Discuss Current Cyber Threat Trends and Challenges

    Policy makers and other industry stakeholders discuss the current cyber-threat landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. BT and Toshiba Launch Groundbreaking Quantum Communication Service

    The network’s first customer, EY, will utilize the network to connect two of its sites in London

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  19. Analyzing the Surprising Data from The State of Ransomware 2022 Report with Chet Wisniewski

    Eleanor Dallaway and Chet Wisniewski dig deep into the more surprising results of The State of Ransomware 2022 Report

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  20. Will Elon Musk’s Twitter Takeover Have Cybersecurity Implications?

    Musk's ambitions to tackle bots on Twitter and make the site's algorithm open source have prompted debate

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?