Infosecurity Magazine Features

IoT Regulation: One Rule to Bind Them All vs Mission Impossible

IoT Regulation: One Rule to Bind Them All vs Mission Impossible

Two experts explore whether the IoT could (and should) be regulated

Are Humans the Weakest Link in the Security Chain?

Are Humans the Weakest Link in the Security Chain?

For too long, the human has been considered the weakest security link. Wendy M. Grossman asks whether it’s time for a change in thinking

Cyber Essentials: Fad or Future

Cyber Essentials: Fad or Future

Back in 2014, the state of cybersecurity had got so troublesome that the UK government developed a standard to prove a level of cyber-hygiene. Infosecurity takes a look at the progress that Cyber Essentials has made, and analyzes its success.

Ask the Experts: How Do You Find Cybersecurity Talent?

Ask the Experts: How Do You Find Cybersecurity Talent?

Three security experts share their thoughts on finding, cultivating and keeping skilled talent amid a cyber-skills gap

Top Ten: Cybersecurity M&A Deals

Top Ten: Cybersecurity M&A Deals

The M&A factor has seen established companies become part of another, brands disappear, technologies launched and most importantly – new companies and sectors created

Security & the Social Network: the Good, the Bad & the Overshared

Security & the Social Network: the Good, the Bad & the Overshared

"We all live in a digital age and benefit from social media but we don't have to put everything about ourselves out there! "

When IoT Attacks: The End of the World as We Know It?

When IoT Attacks: The End of the World as We Know It?

As IoT devices find their way into everything from aircraft to power plants and even home appliances, Phil Muncaster asks where our obsession with tech disruption will lead us.

Interview: Graham Cluley

Interview: Graham Cluley

Not every infosec expert would liken computer programming to writing a story, but Graham Cluley does. Michael Hill spends an afternoon with the man whose love of a tale preceded his love of tech

Rehabilitating Black Hats

Rehabilitating Black Hats

If you color outside the lines today, will you toe the line tomorrow? Danny Bradbury explores whether those on the cyber ‘dark side’ can turn to the light.

NotPetya Ransomware: Lessons Learned

NotPetya Ransomware: Lessons Learned

Roi Perez explores what the NotPetya ransomware taught an industry still reeling from the WannaCry outbreak

Smartphones Spur Biometric ATM Authentication

Smartphones Spur Biometric ATM Authentication

With the rise of ‘mobile-first’ consumers, Robin Arnfield investigates how smartphones may be the future for biometric authentication at ATMs

The Security Design Flaws of Biometrics

The Security Design Flaws of Biometrics

In my opinion, biometrics don’t follow best practice security principles and therefore fall short in many applications – particularly information security.

What’s Hot on Infosecurity Magazine?