Infosecurity Magazine Features

The CISO of the  Future: Getting Down to Business

The CISO of the Future: Getting Down to Business

As the role that cybersecurity plays in the business environment grows, Michael Hill investigates how the job of the CISO will change from one which once solely oversaw technical solutions to one that will be ever-more business-orientated

Trump’s First Cybersecurity Scorecard

Trump’s First Cybersecurity Scorecard

‘C for effort – could try harder’ seems to be the overall judgment of Trump’s first quarter as President, reports Danny Bradbury

Artificial Intelligence: The Obstacles Standing in its Way

Artificial Intelligence: The Obstacles Standing in its Way

AI is coming and I’d love to tell you it is almost here, yet the reality is there are some sizeable obstacles that stand in the way.

The Future of Security: AI and Cognitive

The Future of Security: AI and Cognitive

Companies must filter massive amounts of data found in network and system logs, directories, database access records and other machine information.

Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

Deception enables the organization to thwart attacks even if it is lacking experienced hunters

How to Effectively Spend Information Security Budget

How to Effectively Spend Information Security Budget

Three experts share their thoughts on the best way to spend budget on information security.

Interview: Chris Wysopal, CTO of Veracode

Interview: Chris Wysopal, CTO of Veracode

Chris Wysopal from Veracode describes his job as “building services that enable developers to write secure code.”

Could High Speed Training Offer an Express Route to Solving the Skills Gap?

Could High Speed Training Offer an Express Route to Solving the Skills Gap?

Following the launch of the Cyber Retraining Academy, Stephen Jones, UK MD at SANS Institute, argues that if we are to provide an immediate resolution to the urgent cybersecurity skills gap, recruiters must prioritize psychometric testing and high-speed training over degrees and ‘career experience’

The Top Ten Data Breaches of All Time

The Top Ten Data Breaches of All Time

While the data collection and retention concept has taken off as the online world has evolved, the cost has been major losses and breaches of that data suffered by those entrusted to securely store it.

Interview: Dr Jessica Barker

Interview: Dr Jessica Barker

There aren’t many things as intricate and complex as information security, but human behavior is probably one of them. At least, that’s the message Michael Hill got after spending an afternoon with independent cybersecurity consultant Dr Jessica Barker.

Interview: Javvad Malik

Interview: Javvad Malik

Javvad Malik, perhaps equally known as @J4VV4D or one of the three Host Unknown musketeers, wanted to be an actor when he grew up. More specifically, a wise-cracking side-kick, or a menacing villain. Instead, he’s a security advocate at AlienVault, where his job is to make information security as accessible and understandable to as broad an audience as possible. Whilst there may not be a red carpet, he finds it “immensely rewarding to see how we help secure organizations”.

Killing Me Softly with His Hack

Killing Me Softly with His Hack

Cybersecurity attacks can, and have, killed companies – but now analysts think larger firms will fall.

What’s Hot on Infosecurity Magazine?