News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Ken Munro
Ken Munro
Partner, Pen Test Partners
Security by Obscurity: The Flip-Side of the Compliance Coin
Webinar
30 May 2019
Super Systemic IoT Issues
Opinion
6 Mar 2019
EU Cybersecurity Certification: a Missed Opportunity
Blog
5 Sep 2018
Review: "Industrial Cyber Security for Dummies"
Review
30 Nov 2017
IoT Regulation: One Rule to Bind Them All vs Mission Impossible
Magazine Feature
28 Nov 2017
Gone in Less Than 60 Seconds: Why the Automotive Industry Needs to Get up to Speed with Security
Opinion
17 Jun 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
28 Mar 2016
Are Keyless Car Manufacturers Clueless About Disclosure?
Opinion
26 Aug 2015
How Deniability is Covering Up Security Weaknesses
Opinion
27 May 2015
Browsers, Certificates and Trust: What's Changing and What You Need to Know
Webinar
2 Apr 2015
Shellshock: the Exploits behind the Headlines
Webinar
9 Oct 2014
Developing a Holistic Approach to Patch Management
Webinar
13 Nov 2014
Know your enemy: inside a perimeter-based attack
Webinar
19 Jun 2014
Advanced Cyber Attacks: Identifying The Culprits
Webinar
5 Sep 2013
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
AI Hallucinations Create “Slopsquatting” Supply Chain Threat
News
14 Apr 2025
1
Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI
News
15 Apr 2025
2
Compliance Now Biggest Cyber Challenge for UK Financial Services
News
15 Apr 2025
3
LabHost Phishing Mastermind Sentenced to 8.5 Years
News
15 Apr 2025
4
US Blocks Foreign Governments from Acquiring Citizen Data
News
14 Apr 2025
5
New Malware ResolverRAT Targets Healthcare and Pharma Sectors
News
14 Apr 2025
6
NCSC Warns of Spyware Targeting Chinese and Taiwanese Diaspora
News
9 Apr 2025
1
Google Cloud: China Achieves “Cyber Superpower” Status
News
10 Apr 2025
2
Chaos Reigns as MITRE Set to Cease CVE and CWE Operations
News
16 Apr 2025
3
Digital Certificate Lifespans to Fall to 47 Days by 2029
News
14 Apr 2025
4
NVD Revamps Operations as Vulnerability Reporting Surges
News
11 Apr 2025
5
Trump Administration Shakes Up CISA with Staff and Funding Cuts
News
12 Mar 2025
6
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
1
The Evolving Ransomware Landscape: A 2025 Survival Guide
Webinar
15 Apr 2025
2
Proactive Incident Response and Recovery: Navigating Ransomware Attacks
Webinar
15 Apr 2025
3
Fireside Chat: How Initial Access Brokers Fuel the Ransomware-as-a-Service Model
Webinar
15 Apr 2025
4
Ransomware Negotiations: Mastering an Attacker’s Mindset and Minimizing Leverage
Webinar
15 Apr 2025
5
How to Update Your PAM Strategy to Protect Hybrid Cloud Infrastructures
Webinar
27 Mar 2025
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6