Infosecurity Magazine

Latest News and Features

On-Demand Webinars

  • Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
  • Mastering AI Security With ISACA’s New AAISM Certification
  • Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
  • Audit & Compliance in the Era of AI and Emerging Technology
  • Modernizing GRC: From Checkbox to Strategic Advantage
  • How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
  • Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
  • OT Security Ecosystem for Targeted Risk Reduction and Reporting
  • The Invisible Frontline: Proactive Approaches to Browser Defense
  • Mastering Identity and Access for Non-Human Cloud Entities

Podcasts

  • How 2025 Shaped the Future of Cybersecurity
  • Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
  • Can AI Solve the Vulnerability Problem in Critical Infrastructure?
  • ToolShell Deep Dive: The SharePoint Exploit Crisis Uncovered
  • Unpacking Trump's Cybersecurity Executive Order
  • Your Guide to Infosecurity Europe: Insider Tips from Leading Cybersecurity Experts
  • Vulnerability Overload: The NVD and CVE Challenges Ahead
  • The Information Heist: Cracking the Code on Infostealers
  • Unlocking Infosecurity Europe: Must-See Sessions & Pro Tips
  • Change Healthcare Cyber-Attack: Inside the Disruption and the Lessons Learned

More news and features