Infosecurity News Features
Experts Discuss Proposed Changes to the UK’s Data Protection Regime
Westminster eforum panel highlights the opportunities and challenges posed by potential changes to the UK's data protection regime
#FraudAwarenessWeek: Addressing Surging Business Fraud
This year's International Fraud Awareness Week provides an opportunity to highlight surging business fraud
Is Application Isolation the Future of Endpoint Security?
Phil Muncaster investigates what the technology has to offer for enterprise CISOs
#CyberMonth: How to Protect Yourself from Phishing Attacks
Online users should follow this year's #CSAM mantra of 'Think Before U Click' to detect phishing attacks
Connected Devices: The Hidden Smart Home Endpoints Expanding the Corporate Attack Surface
Amidst the scramble to secure remote working laptops, Phil Muncaster asks whether IT teams should focus their efforts more broadly
#NITAM: Mitigating Non-Malicious Insider Risk
How can organizations reduce the risk of negligent insider threats?
CREST Concludes Investigation and Responds to NCC Group Exam Leak Scandal
After a year-long investigation, Phil Muncaster asks what lessons can be learned from the CREST exam leak scandal
Experts React to the UK's Planned Divergence from GDPR
What could the UK's planned divergence from GDPR mean for businesses and individual privacy?
#WomensEqualityDay: How to Increase Opportunities for Women in Tech
Leading figures in cyber and tech offer their thoughts on how women can progress in this sector
Biometrics: Addressing Ethical and Legal Challenges
Organizations should implement biometric technologies carefully, ensuring they don't fall foul of ethical and legal problems
Robert Hannigan: Cyber-Industry Needs to Get Back to Basics
Speaking during last month's Infosecurity Europe virtual conference, Robert Hannigan explains that focusing on the basics is key to staying secure
The Looming Threat of Deepfakes
Deepfakes are becoming more popular and more dangerous. Yet, detection technologies offer a vital countermeasure.
Why Endpoint Security Needs to Adapt to the New Distributed Workplace
As the pandemic recedes, flexible working practices will remain. Phil Muncaster investigates the cybersecurity challenges this will create
Mitigating Cyber-Threats to High-Profile Events
As high-profile events with spectators return, what cyber-risks should organizers be looking at in their preparations?
The Cyber House Party Lets its Hair Down for Infosecurity Europe
The Cyber House Party will be the official after-show event for next week's Infosecurity Europe virtual conference
The Growing Role of Privileged Access Management in Keeping Organizations Secure
Infosecurity Magazine explores how easy it can be to obtain login credentials and how to develop a privileged access management (PAM) strategy to mitigate this problem
#ScamsAwarenessFortnight - Adopting a Zero Trust Mindset to Tackle Fraud
The dangerous growth in fraud since the pandemic means businesses must adopt an effective zero trust attitude
Security and Privacy Challenges Threaten to Ground Vaccine Passports
Vaccine passports hold one of the keys to getting the travel industry up in the air again, but they are not without privacy and security challenges
#WorldPasswordDay: Five Tips to Make Passwords Secure AND Convenient
Can strong password security go hand in hand with convenience?
Gone Too Soon: Dan Kaminsky, Hacker Hero
Kaminsky was admired not just for his technical skills but for the way he engaged with others, always learning, teaching and embodying the hacker spirit