News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
IBS Software
IBS Software
Company
Content brought to you by IBS Software
From Cyber-Attack to Burglary: The Surprising Impact of the French Shooting Federation Breach
Opinion
27 February 2026
Quantum Computers Are Coming for Your Crypto Keys, But Not Yet
Opinion
24 January 2025
Why Voice Authentication Should Not Be Used to Secure Critical Assets
Opinion
22 March 2024
No, Nobody’s Going to Steal Your Password While You Type on a Zoom Call!
Opinion
22 September 2023
A Decade On – What’s Happened to Crowdsourced Security?
Opinion
4 May 2023
Log4j Showed Us That Public Disclosure Still Helps Attackers
Opinion
7 February 2022
Crowdsourced Bug Bounty Programs: Security Gains Versus Potential Losses
Magazine Feature
26 February 2021
Is $50,000 for a Vulnerability Too Much?
Opinion
16 February 2021
Automated Penetration Testing – Can it Replace Humans?
Opinion
23 December 2020
Life as a Crowdsourced Hacker – Why You Won’t Become a Millionaire
Opinion
20 January 2020
Crowdsourced Security is Redefining the Gig Economy, and Not in a Good Way
Opinion
5 September 2019
Schrodinger’s vulnerability - Using Exploitability to Avoid Chasing Phantom Risk
Opinion
15 February 2019
Enter Crowdsourced Security, the Future of Pen Testing?
Blog
16 August 2018
Is it Time to Replace Pen Testing with Crowdsourced security?
Blog
14 August 2018
Are Data Brokers Actually Secure?
Opinion
15 August 2017
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds
News
25 February 2026
1
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
2
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
3
Jackpotting Surge Costs Banks Over $20m, Warns FBI
News
23 February 2026
4
Exploitable Vulnerabilities Present in 87% of Organizations
News
26 February 2026
5
UK's Data Watchdog Gets a Makeover to Match Growing Demands
News
26 February 2026
6
AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike
News
24 February 2026
1
New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix
News
9 February 2026
2
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
3
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
News
19 February 2026
4
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
5
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
6
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
1
What’s Next for AI Identity in 2026
Webinar
16:00 —
16:25, 24 February 2026
2
Why Your Organisation Needs Trusted Time Synchronisation
Webinar
15:00 —
16:00, 19 February 2026
3
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
4
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
16:00 —
17:00, 23 October 2025
5
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
6
The Intelligence Edge: Clarity, Context and the Human Advantage in Modern CTI
Webinar
15:00 —
16:00, 12 March 2026
1
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
2
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
3
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
4
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
5
Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
Opinion
6 February 2026
6
Close