Infosecurity Magazine Features

Offensive Cyber-Capabilities: How and When Should They Be Used?
As nation states increasingly look to develop cyber-offensive capabilities, Infosecurity considers the benefits and risks involved

Profile Interview: Javvad Malik
Michael Hill meets security super blogger and all-round nice guy Javvad Malik to learn how he became one of the most well-respected and genuinely liked individuals in the infosec industry

Crowdsourced Bug Bounty Programs: Security Gains Versus Potential Losses
The pros and cons of crowdsourced bug bounty efforts

Trolling, Sexual Harassment and Murder Threats: The Dark Social Web
Eleanor Dallaway investigates trolling in the infosecurity industry and discovers a more sinister culture of sexual harassment, bullying and murder threats

Q&A: Talya Parker
Talya Parker reflects on her journey into the infosec industry, career flexibility and the need for better recruitment strategies in the sector

Cybersecurity’s Economic Health Post-Pandemic
How has the industry’s bottom line been impacted by COVID-19and what does the future economic health of the sector look like Infosecurity finds out

FireEye Breach: A Tipping Point in Nation State Attacks
Infosecurity assesses the impact of one of the largest state-sponsored campaigns of all time

How Threat Actors and Fake News Are Disrupting Vaccine Efforts
As COVID-19 vaccines become a reality, how can cyber-threats and misinformation disrupt their delivery?

PAM in the Enterprise: Pros Versus Cons
The benefits and drawbacks of implementing privileged access management in an organization

The Weaponization of Pen-Testing Tools
How big an issue is the weaponization of pen-testing tools and how can it be mitigated?

Q&A: Raef Meeuwisse
Raef Meeuwisse sheds light on his infosec career journey, industry challenges and dream job

Cybersecurity and the Business: Aiming for Alignment
Why the security function must successfully align itself with the various facets of the wider business.