Infosecurity Editorial

Behavioral Analytics in Cybersecurity

Behavioral Analytics in Cybersecurity

Behavioral analytics has become a real buzz topic in information security over the last few years and, in many ways, with good reason

Editorial Q2 2017: Hand of Fate

Editorial Q2 2017: Hand of Fate

Eleanor Dallaway examines the hand of fate in most information security professionals' path into the information security industry.

A New Goverment - Who's Hacking Whom?

A New Goverment - Who's Hacking Whom?

Last year was another busy one for the cybersecurity world. Aside from ransomware, DDoS attacks and social media hacking all making the headlines, it was also the year that cyber-threats surrounding the political voting process were brought to light more than ever before.

Editorial Q1 2017 Magazine: Spinning the Wheel

Editorial Q1 2017 Magazine: Spinning the Wheel

It’s a new year and a new Infosecurity Magazine. I am so excited to finally send this issue to press as the re-design has been a project I’ve been working on for some time, and I am thrilled to see the design templates come to life in this Q1 issue of Infosecurity.

The Curtain Lifts on Infosecurity Magazine Conference

The Curtain Lifts on Infosecurity Magazine Conference

Michael Hill looks at what makes cybersecurity conferences so popular, well-attended and meaningful

2016 : Two Steps Forward, Three Steps Back

2016 : Two Steps Forward, Three Steps Back

Looking back upon 2016, it does feel like a year when security took some distinct backward steps, and a few in the right direction

Don't Wanna Let EU Go

Don't Wanna Let EU Go

Another Infosecurity Europe has come and gone, and for me it was my ninth and the first as part of the team behind the show and I was delighted not only by the high turnout of visitors, exhibitors and speakers, but the general good vibe about the direction of the industry which was plain to see

Do Not Ignore or Sacrifice Personal Privacy

Do Not Ignore or Sacrifice Personal Privacy

The term ‘privacy’ can be defined as “a state in which one is not observed or disturbed by other people.”

Editorial Q2 2016: Everything You'll Look for You’ll Find

Editorial Q2 2016: Everything You'll Look for You’ll Find

2016 has seen enterprises battle with ransomware as the most malicious of malware hit and shut down hospitals, while wearables, devices and industrial control systems deemed to be “the Internet of Things” has the promise to puncture more holes in an already aerated perimeter.

Editorial Q1 2016: The Stars Look Very Different Today

Editorial Q1 2016: The Stars Look Very Different Today

I’ve been delighted to join Infosecurity Magazine for the majority of this year covering for the remainder of Eleanor’s time away, and with seven years of experience behind me in covering information security as both a journalist and analyst, I’ve long admired this brand’s approach and coverage of the topic. Of course 2016 brings with a new set of ambitions and predictions, and over the time I get to spend in the editor’s chair I’ll do my best to address those directly.

Editorial Q4 2014: Music Sounds Better with You

Editorial Q4 2014: Music Sounds Better with You

In his keynote at Black Hat in Vegas this summer, Dan Geer presented on the issue of mandatory breach disclosure. He drew a comparison between the information security industry and the aviation sector, an analogy that I’d discussed only the day before over lunch with the great Jack Daniel and Trey Ford.

Editorial Q3 2014: Fight the Power

Editorial Q3 2014: Fight the Power

It was during an interview at Infosecurity Europe when my interviewee said to me “Every single vendor in this exhibition hall does exactly the same thing” when I realized that I’m actually quite protective about our industry’s vendor community.

What’s Hot on Infosecurity Magazine?