Infosecurity Magazine Features

Information Sharing: Better Together

Information Sharing: Better Together

Information sharing can be a win-win for public and private sectors, Phil Muncaster discovers, but there are still hurdles to overcome

NSA: Business as Usual

NSA: Business as Usual

The NSA has experienced its biggest legislative setback in nearly 40 years – but there’s a fishy smell to it, reports Danny Bradbury

Windows Server 2003: End of the Road

Windows Server 2003: End of the Road

It’s the end of Windows Server 2003 as we know it. Do you feel fine? asks Johna Till Johnson

Tales from the Crypt: Hardware vs Software

Tales from the Crypt: Hardware vs Software

Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various solutions on offer

The Rising Cost of Cyber-Insurance

The Rising Cost of Cyber-Insurance

You can insure yourself against cyber-attack, says Danny Bradbury, but be warned, prices are going up

Cybersecurity from Capitol Hill to Whitehall

Cybersecurity from Capitol Hill to Whitehall

Proclamations on cybersecurity and government surveillance have ignited political discourse in early 2015. Wendy M. Grossman cuts through the spin to find out what this means for technologists and citizens

Lizard Squad: Original Pranksters

Lizard Squad: Original Pranksters

Whether meddling kids or a serious menace, Lizard Squad is part of a phenomenon that is here to stay

Google vs Microsoft: Let the Patch Wars Commence

Google vs Microsoft: Let the Patch Wars Commence

Phil Muncaster investigates whether an ongoing dispute between Google and Microsoft could change the way we fix security flaws in the future

Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

We’re all looking for the next great threat to infrastructure, but there is still a host of simple attacks we should be guarding against, says Rene Millman

The Cyber-Threat of Things

The Cyber-Threat of Things

There is an increasing landscape of risks facing well-connected businesses, and security practitioners must act now to mitigate them, explains Wendy M. Grossman

Computer Says “No”: Will We Ever be Rid of DDoS Attacks?

Computer Says “No”: Will We Ever be Rid of DDoS Attacks?

With DDoS attacks reportedly increasing in size and complexity in 2014, Phil Muncaster canvasses the industry on where the problems lie and how we can respond

A Higher Law

A Higher Law

It is not wisdom, but authority, that makes a law, the saying goes. Perhaps that’s why international cybersecurity laws are so lacking, says Danny Bradbury

What’s Hot on Infosecurity Magazine?