Infosecurity Magazine Features

Laying the Smackdown - When Hacking Back is Legitimate

Laying the Smackdown - When Hacking Back is Legitimate

If you’re prepared to attack back, you need to be able to hit the other side harder than they hit you, and you always have to be ready to be hit with the best you have got. Transfer this away from Chicago crime bosses and the law and into the world of cybersecurity, and you have a case of attackers and defenders. Yet there are rare examples of those being attacked actually taking the fight back to the attacker.

The UK Cybersecurity Strategy: How it Measures Up

The UK Cybersecurity Strategy: How it Measures Up

The new UK cybersecurity strategy has, generally, been welcomed since it was announced in November 2016. However, will it really be able to measure the countless different factors that make up cyber-threats?

Trump's White House: What Now for Cybersecurity?

Trump's White House: What Now for Cybersecurity?

Cybersecurity came to the fore in this presidential race like never before, but many question Donald Trump’s tech credentials going forward. Phil Muncaster investigates…

The Risk Avengers

The Risk Avengers

What do you get when you combine three talented and experienced cybersecurity professionals? Eleanor Dallaway met The Risk Avengers and found out​

Medical Devices Need a Strong Dose of Cybersecurity

Medical Devices Need a Strong Dose of Cybersecurity

Technical innovations in the industry – the increasing adoption of electronic health records combined with an ever-increasing network of medical devices, healthcare apps and wearables –open up even more avenues for cyber-criminals to gain unauthorized access to sensitive data.

How to Get on the Right Side of the EU Data Regulations

How to Get on the Right Side of the EU Data Regulations

Richard Whomes outlines how organizations handling cross-border data can make sure they stay on top of the EU General Data Protection Regulation and US-based Privacy Shield

Redefining Security in the Internet of Services

Redefining Security in the Internet of Services

Devices ranging from smartphones to home automation systems, smart lights fitness wearables and embedded vehicle sensors have created an incredible platform that we know as the Internet of Things (IoT), but this vast constellation of connected devices is only the first step in a longer journey. The next step involves creating services that run on top of it. This new layer – which we can call the Internet of Services (IoS) – brings its own security challenges.

Should C-Level Bonuses Be Linked to Cybersecurity Success?

Should C-Level Bonuses Be Linked to Cybersecurity Success?

MPs suggested bonuses should be slashed for CEOs whose firms were hit by cyber-attacks. Sooraj Shah asks whether that’s fair

Making Bugs Bountiful

Making Bugs Bountiful

With black hat brokers able to outbid even the likes of Google and Apple for vulnerabilities, Davey Winder explores the possibility that the bug bounty model is fundamentally flawed

Skills Gap: How to Attract the Best Staff

Skills Gap: How to Attract the Best Staff

As the cybersecurity skills gap continues to plague the industry, it has never been more important for organizations to have a sound understanding of how to attract and retain the best staff. Michael Hill reports

Ransomware Economics: Why the Threat is Here to Stay

Ransomware Economics: Why the Threat is Here to Stay

The concept of extorting a victim for money is nothing new; in fact it’s older than the internet by many centuries. Over the years, however, malware has evolved from spying on users and harvesting information, to promoting malicious links for clickbait, to the current straight forward tactic of ‘give us your money’.

Interview: Jennifer Steffens, CEO of IOActive

Interview: Jennifer Steffens, CEO of IOActive

Jennifer Steffens, CEO of IOActive, loves sailing. She also loves live music and snowshoeing, but above all, she loves her job. In a suite overlooking Las Vegas Boulevard, Eleanor Dallaway spends an afternoon with the matriarch of the research firm

What’s Hot on Infosecurity Magazine?