News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Ken Munro
Ken Munro
Partner, Pen Test Partners
Security by Obscurity: The Flip-Side of the Compliance Coin
Webinar
30 May 2019
Super Systemic IoT Issues
Opinion
6 Mar 2019
EU Cybersecurity Certification: a Missed Opportunity
Blog
5 Sep 2018
Review: "Industrial Cyber Security for Dummies"
Review
30 Nov 2017
IoT Regulation: One Rule to Bind Them All vs Mission Impossible
Magazine Feature
28 Nov 2017
Gone in Less Than 60 Seconds: Why the Automotive Industry Needs to Get up to Speed with Security
Opinion
17 Jun 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
28 Mar 2016
Are Keyless Car Manufacturers Clueless About Disclosure?
Opinion
26 Aug 2015
How Deniability is Covering Up Security Weaknesses
Opinion
27 May 2015
Browsers, Certificates and Trust: What's Changing and What You Need to Know
Webinar
2 Apr 2015
Shellshock: the Exploits behind the Headlines
Webinar
9 Oct 2014
Developing a Holistic Approach to Patch Management
Webinar
13 Nov 2014
Know your enemy: inside a perimeter-based attack
Webinar
19 Jun 2014
Advanced Cyber Attacks: Identifying The Culprits
Webinar
5 Sep 2013
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
New Malware Can Kill Engineering Processes in ICS Environments
News
19 Dec 2024
1
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
2
US Organizations Still Using Kaspersky Products Despite Ban
News
19 Dec 2024
3
Phishing Attacks Double in 2024
News
18 Dec 2024
4
Crypto-Hackers Steal $2.2bn as North Koreans Dominate
News
19 Dec 2024
5
Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment”
News
19 Dec 2024
6
Cybercriminals Exploit Google Calendar to Spread Malicious Links
News
17 Dec 2024
1
New APIs Discovered by Attackers in Just 29 Seconds
News
17 Dec 2024
2
US Unveils New National Cyber Incident Response Plan
News
17 Dec 2024
3
Texas Tech University Data Breach Impacts 1.4 Million
News
17 Dec 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
YouTube Creators Targeted in Global Phishing Campaign
News
16 Dec 2024
6
Alert Fatigue: What Are You and Your Security Teams Missing?
Webinar
5 Dec 2024
1
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
4 Dec 2024
2
How to Manage Your Risks and Protect Your Financial Data
Webinar
30 Oct 2024
3
New Cyber Regulations: What it Means for UK and EU Businesses
Webinar
10 Oct 2024
4
The Future of Fraud: Defending Against Advanced Account Attacks
Webinar
18 Jul 2024
5
Learn Key Strategies for Industrial Data Security
Webinar
27 Jun 2024
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6