Infosecurity Magazine Features

Checking the NHS’s Security Pulse

Checking the NHS’s Security Pulse

Managing 40,000 devices across 500 sites is a huge challenge for any organization. But in the health sector added, mandatory security concerns make this even harder.

Penetrating the IT Dark Cloud

Penetrating the IT Dark Cloud

Cloud apps are revolutionizing enterprise IT, and their usage only continues to expand as businesses deploy them at a rapid pace. However, they also pose their own set of security risks

Security’s Ever-Growing, Ever-Moving Target

Security’s Ever-Growing, Ever-Moving Target

Portable platforms increasingly form the cornerstone of enterprises’ long-term strategic aims to be more flexible and agile. But how is security developing to prevent more threat vectors from being introduced?

Hacking the Cheaters

Hacking the Cheaters

What does the Ashley Madison incident says about security and privacy in 2015

When Outsiders Become Insiders

When Outsiders Become Insiders

Abuse of privileged access to systems is a growing cyber-threat, presenting an easier way in for hackers in many cases than traditional brute force attacks

Health, Safety and Security

Health, Safety and Security

Forget the bond of doctor-patient confidentiality, cyber-attacks pose a much bigger threat to your sensitive medical data, finds Wendy M. Grossman as she assesses the recent spate of healthcare breaches

Securing the Smart City

Securing the Smart City

The smart city has long been the realm of science fiction. However, as dark fiber, big data and the internet of things start to converge, the reality is not as distant as it seems. But what are the security implications? Davey Winder investigates

Information Sharing: Better Together

Information Sharing: Better Together

Information sharing can be a win-win for public and private sectors, Phil Muncaster discovers, but there are still hurdles to overcome

NSA: Business as Usual

NSA: Business as Usual

The NSA has experienced its biggest legislative setback in nearly 40 years – but there’s a fishy smell to it, reports Danny Bradbury

Windows Server 2003: End of the Road

Windows Server 2003: End of the Road

It’s the end of Windows Server 2003 as we know it. Do you feel fine? asks Johna Till Johnson

Tales from the Crypt: Hardware vs Software

Tales from the Crypt: Hardware vs Software

Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various solutions on offer

The Rising Cost of Cyber-Insurance

The Rising Cost of Cyber-Insurance

You can insure yourself against cyber-attack, says Danny Bradbury, but be warned, prices are going up

What’s Hot on Infosecurity Magazine?