Infosecurity Magazine Features

Artificial Intelligence: The Obstacles Standing in its Way

Artificial Intelligence: The Obstacles Standing in its Way

AI is coming and I’d love to tell you it is almost here, yet the reality is there are some sizeable obstacles that stand in the way.

The Future of Security: AI and Cognitive

The Future of Security: AI and Cognitive

Companies must filter massive amounts of data found in network and system logs, directories, database access records and other machine information.

Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

Deception enables the organization to thwart attacks even if it is lacking experienced hunters

How to Effectively Spend Information Security Budget

How to Effectively Spend Information Security Budget

Three experts share their thoughts on the best way to spend budget on information security.

Interview: Chris Wysopal, CTO of Veracode

Interview: Chris Wysopal, CTO of Veracode

Chris Wysopal from Veracode describes his job as “building services that enable developers to write secure code.”

Could High Speed Training Offer an Express Route to Solving the Skills Gap?

Could High Speed Training Offer an Express Route to Solving the Skills Gap?

Following the launch of the Cyber Retraining Academy, Stephen Jones, UK MD at SANS Institute, argues that if we are to provide an immediate resolution to the urgent cybersecurity skills gap, recruiters must prioritize psychometric testing and high-speed training over degrees and ‘career experience’

The Top Ten Data Breaches of All Time

The Top Ten Data Breaches of All Time

While the data collection and retention concept has taken off as the online world has evolved, the cost has been major losses and breaches of that data suffered by those entrusted to securely store it.

Interview: Dr Jessica Barker

Interview: Dr Jessica Barker

There aren’t many things as intricate and complex as information security, but human behavior is probably one of them. At least, that’s the message Michael Hill got after spending an afternoon with independent cybersecurity consultant Dr Jessica Barker.

Interview: Javvad Malik

Interview: Javvad Malik

Javvad Malik, perhaps equally known as @J4VV4D or one of the three Host Unknown musketeers, wanted to be an actor when he grew up. More specifically, a wise-cracking side-kick, or a menacing villain. Instead, he’s a security advocate at AlienVault, where his job is to make information security as accessible and understandable to as broad an audience as possible. Whilst there may not be a red carpet, he finds it “immensely rewarding to see how we help secure organizations”.

Killing Me Softly with His Hack

Killing Me Softly with His Hack

Cybersecurity attacks can, and have, killed companies – but now analysts think larger firms will fall.

The Future of Encryption

The Future of Encryption

As technology advances so does our ability to encrypt data, with neural networks now capable of learning how to keep data safe. With so much innovation at our fingertips, Davey Winder explores where else encryption might go in the future.

Laying the Smackdown - When Hacking Back is Legitimate

Laying the Smackdown - When Hacking Back is Legitimate

If you’re prepared to attack back, you need to be able to hit the other side harder than they hit you, and you always have to be ready to be hit with the best you have got. Transfer this away from Chicago crime bosses and the law and into the world of cybersecurity, and you have a case of attackers and defenders. Yet there are rare examples of those being attacked actually taking the fight back to the attacker.

What’s Hot on Infosecurity Magazine?