News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Tara Seals
Tara Seals
US/North America News Reporter,
Infosecurity Magazine
70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks
News
18 April 2018
IT Managers Lack Visibility into Almost Half of Network Traffic
News
18 April 2018
Cryptominers Replace Ransomware as No. 1 Threat
News
17 April 2018
ISACA: Gender Disparity in Cyber Persists
News
17 April 2018
Facebook, Microsoft and 32 Others Form Cyber Consortium
News
17 April 2018
A Pair of Mobile Apps in Google Play Target Mideast Victims
News
16 April 2018
Most Web Apps Contain High-Severity Vulnerabilities
News
16 April 2018
University of Virginia Nabs Top Honors in Collegiate Cyber Contest
News
16 April 2018
Early Bird Code Injection Gets the Obfuscation Worm
News
13 April 2018
Scammers Bank on Cryptocurrency with Fake Apps
News
13 April 2018
Cybercriminals Earn Millions, And Spend It Wildly
News
13 April 2018
Nation-State Attacks Take 500% Longer to Find
News
12 April 2018
Google Will Distrust Additional CAs, IT Pros Predict
News
12 April 2018
UK Launches Offensive Cyber-Weapons Against Islamic State
News
12 April 2018
Crypto-Mining Spikes 500% on Corporate Networks
News
10 April 2018
Orgs Are Holding Back on Cloud-Based Security
News
10 April 2018
Organizations Failing at Timely Detection of Threats
News
10 April 2018
Brazilian Criminals Use HTTP Injectors to Gain Free Mobile Internet Access
News
9 April 2018
17% of Workers Fall for Social Engineering Attacks
News
9 April 2018
Fraudsters Are Stealing Corporate Funds with Tampered Debit Cards
News
9 April 2018
Raróg Crypto-Miner Allows Affordable Criminality
News
6 April 2018
One-Fifth of Open-Source Serverless Apps Have Critical Vulnerabilities
News
6 April 2018
Sears/Delta Card Breach Widens to Include Best Buy
News
6 April 2018
Sears, Kmart and Delta Hit with Payment-Card Breach
News
5 April 2018
Rampant Misconfigurations Expose 1.5 Billion Sensitive Corporate Files
News
5 April 2018
100% of Web Apps Contain Vulnerabilities
News
5 April 2018
Half of Cyber-Pros Believe They're Losing the Fight
News
4 April 2018
2.7 Million UK Businesses Wide Open to IoT Hacks
News
4 April 2018
DHS Detects Cell-Phone Spy Gear in DC
News
4 April 2018
Americans Resigned to ID Theft, But Taking Steps
News
3 April 2018
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds
News
25 February 2026
1
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
2
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
3
Jackpotting Surge Costs Banks Over $20m, Warns FBI
News
23 February 2026
4
Exploitable Vulnerabilities Present in 87% of Organizations
News
26 February 2026
5
UK's Data Watchdog Gets a Makeover to Match Growing Demands
News
26 February 2026
6
AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike
News
24 February 2026
1
New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix
News
9 February 2026
2
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
3
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
News
19 February 2026
4
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
5
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
6
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
1
What’s Next for AI Identity in 2026
Webinar
16:00 —
16:25, 24 February 2026
2
Why Your Organisation Needs Trusted Time Synchronisation
Webinar
15:00 —
16:00, 19 February 2026
3
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
4
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
16:00 —
17:00, 23 October 2025
5
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
6
The Intelligence Edge: Clarity, Context and the Human Advantage in Modern CTI
Webinar
15:00 —
16:00, 12 March 2026
1
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
2
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
3
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
4
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
5
Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
Opinion
6 February 2026
6
Close