Infosecurity Magazine Features

Insuring Safety in Cyber

Insuring Safety in Cyber

The last time that Infosecurity looked at the cyber-insurance market, the hype machine was in overdrive about taking it out, what it covers and how much coverage you could get. However, the big question remains on whether or not it’s really worthwhile having insurance to protect you from an unknown threat.

Awareness Training: Time for an Overhaul?

Awareness Training: Time for an Overhaul?

Back in June, a couple of hundred people packed into a conference hall at Infosecurity Europe 2016. The title of the session was ‘Securing the Connected Human’ and it was described in the show guide as being about security awareness training. Those who attended in the hope of getting some tips on how to do it, or some reassurance that what they’re currently doing is right, probably walked away mightily disappointed.

Outlandish Car Hacking Claims?

Outlandish Car Hacking Claims?

Many electric and connected cars have proved to be hackable, and visitors to this year’s Infosecurity Europe got to see another example – the Mitsubishi Outlander; a plug in hybrid electric vehicle with a mobile app, usually used for locating the car, flashing the headlights and locking it remotely, which is enabled by a Wi-Fi access point on the vehicle.

Malware Swiftly Goes Upscale

Malware Swiftly Goes Upscale

Like anyone perfecting their craft, cyber-criminals are honing their skills and aiming upward, using malware to steal money not only from retail payments systems but from the global commercial payments systems used to transfer billions among banks every day.

The Future of Regulation in the Digital World

The Future of Regulation in the Digital World

Technology adoption and digital innovation has revolutionized the current commercial environment – from driverless cars and drones delivering goods to digital payments, innovation is pushing ahead at a significantly faster pace than regulation.

ATMs Still a Weak Link for Bank Security

ATMs Still a Weak Link for Bank Security

More than physical distraction and rogue software applications on the ATM itself, the securing of the hole in the wall has become a priority in banking security. Robin Arnfield looks at threats and developments

Divided We Stand: Will Brexit Weaken the UK’s Cybersecurity Industry?

Divided We Stand: Will Brexit Weaken the UK’s Cybersecurity Industry?

After the historic EU referendum result in June, Phil Muncaster takes a look at what the next steps are

Seconomics

Seconomics

Money continues to be spent on security solutions and services, but is there a return on investment? Wendy M. Grossman looks at the case for security economics and whether spending to defend really adds up

The Best View

The Best View

If analysis technology is the next trend, how is it being deployed? Dan Raywood talks to Gigamon’s Marshall Wolfe about his deployment and what he feels he gets from it

Wolf in Sheep’s Clothing: Combating the Insider Threat

Wolf in Sheep’s Clothing: Combating the Insider Threat

What can you do to defend against the unknown quantity that is the insider threat? Adam F. Godfrey, CISSP looks at some solutions and if your ally is actually your enemy in disguise

Connected Vehicles: the Next Big Security Challenge?

Connected Vehicles: the Next Big Security Challenge?

With the concept of the connected car invading our lives at what often seems like unprecedented speed, ensuring they are made secure at the manufacturing stage is emerging as one of the next big cybersecurity skills challenges. Michael Hill reports

Hackers Have Evolved into Sophisticated, Organized Criminals

Hackers Have Evolved into Sophisticated, Organized Criminals

If there’s one thing the last few years have shown us it’s that hackers have evolved into sophisticated, organized criminals, capable of orchestrating well-oiled, imaginative attacks

What’s Hot on Infosecurity Magazine?