Infosecurity Magazine Features

Top 10: Cyber-Secure Countries

Top 10: Cyber-Secure Countries

What are the most cyber-secure countries to date?

Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t

Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t

Ira Winkler believes you should attribute appropriate blame and penalties to users in cases of clear negligence while Wendy Nather argues this approach is counterproductive

Ask The Experts: How to Stay on Top of Cyber-Hygiene

Ask The Experts: How to Stay on Top of Cyber-Hygiene

Three security experts advise how to develop a continuous cyber-hygiene plan for your organization

Cyber Start-ups: How to Get Off the Ground and into the Stratosphere

Cyber Start-ups: How to Get Off the Ground and into the Stratosphere

Phil Muncaster investigates how to make it big in a sector already worth billions

Dissecting the UK’s New IoT Security Bill

Dissecting the UK’s New IoT Security Bill

The UK’s new PSTI Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?

How not to Pay a Ransomware Demand

How not to Pay a Ransomware Demand

Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand

Securing Smart Cities From Ransomware Crooks

Securing Smart Cities From Ransomware Crooks

Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution

Cybersecurity's Image Problem

Cybersecurity's Image Problem

Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how we can fix them

Diversifying Cyber: A Focus on Neurodiversity and Physical Disability

Diversifying Cyber: A Focus on Neurodiversity and Physical Disability

James Coker takes a deep dive into the NCSC’s recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber

The Security Challenge of the Century: Security in the Metaverse

The Security Challenge of the Century: Security in the Metaverse

Kate O'Flaherty considers the security challenges in the metaverse and investigates how they can be resolved

Stamping Out CSAM With Machine Learning?

Stamping Out CSAM With Machine Learning?

If the question is how to control harmful content, Davey Winder considers whether the answer is machine learning?

Top 10: Cryptocurrency Heists

Top 10: Cryptocurrency Heists

What are the largest recorded cryptocurrency thefts to date?

What’s Hot on Infosecurity Magazine?