Infosecurity Magazine Features

Offensive Cyber-Capabilities: How and When Should They Be Used?

Offensive Cyber-Capabilities: How and When Should They Be Used?

As nation states increasingly look to develop cyber-offensive capabilities, Infosecurity considers the benefits and risks involved

Profile Interview: Javvad Malik

Profile Interview: Javvad Malik

Michael Hill meets security super blogger and all-round nice guy Javvad Malik to learn how he became one of the most well-respected and genuinely liked individuals in the infosec industry

Trolling, Sexual Harassment and Murder Threats: The Dark Social Web

Trolling, Sexual Harassment and Murder Threats: The Dark Social Web

Eleanor Dallaway investigates trolling in the infosecurity industry and discovers a more sinister culture of sexual harassment, bullying and murder threats

Q&A: Talya Parker

Q&A: Talya Parker

Talya Parker reflects on her journey into the infosec industry, career flexibility and the need for better recruitment strategies in the sector

Cybersecurity’s Economic Health Post-Pandemic

Cybersecurity’s Economic Health Post-Pandemic

How has the industry’s bottom line been impacted by COVID-19and what does the future economic health of the sector look like Infosecurity finds out

FireEye Breach: A Tipping Point in 
Nation State Attacks

FireEye Breach: A Tipping Point in Nation State Attacks

Infosecurity assesses the impact of one of the largest state-sponsored campaigns of all time

How Threat Actors and Fake News Are Disrupting Vaccine Efforts

How Threat Actors and Fake News Are Disrupting Vaccine Efforts

As COVID-19 vaccines become a reality, how can cyber-threats and misinformation disrupt their delivery?

PAM in the Enterprise: Pros Versus Cons

PAM in the Enterprise: Pros Versus Cons

The benefits and drawbacks of implementing privileged access management in an organization

The Weaponization of Pen-Testing Tools

The Weaponization of Pen-Testing Tools

How big an issue is the weaponization of pen-testing tools and how can it be mitigated?

Q&A: Raef Meeuwisse

Q&A: Raef Meeuwisse

Raef Meeuwisse sheds light on his infosec career journey, industry challenges and dream job

Cybersecurity and the Business: Aiming for Alignment

Cybersecurity and the Business: Aiming for Alignment

Why the security function must successfully align itself with the various facets of the wider business.

What’s Hot on Infosecurity Magazine?