Infosecurity Magazine Features
Could High Speed Training Offer an Express Route to Solving the Skills Gap?
Following the launch of the Cyber Retraining Academy, Stephen Jones, UK MD at SANS Institute, argues that if we are to provide an immediate resolution to the urgent cybersecurity skills gap, recruiters must prioritize psychometric testing and high-speed training over degrees and ‘career experience’
The Top Ten Data Breaches of All Time
While the data collection and retention concept has taken off as the online world has evolved, the cost has been major losses and breaches of that data suffered by those entrusted to securely store it.
Interview: Dr Jessica Barker
There aren’t many things as intricate and complex as information security, but human behavior is probably one of them. At least, that’s the message Michael Hill got after spending an afternoon with independent cybersecurity consultant Dr Jessica Barker.
Interview: Javvad Malik
Javvad Malik, perhaps equally known as @J4VV4D or one of the three Host Unknown musketeers, wanted to be an actor when he grew up. More specifically, a wise-cracking side-kick, or a menacing villain. Instead, he’s a security advocate at AlienVault, where his job is to make information security as accessible and understandable to as broad an audience as possible. Whilst there may not be a red carpet, he finds it “immensely rewarding to see how we help secure organizations”.
Killing Me Softly with His Hack
Cybersecurity attacks can, and have, killed companies – but now analysts think larger firms will fall.
The Future of Encryption
As technology advances so does our ability to encrypt data, with neural networks now capable of learning how to keep data safe. With so much innovation at our fingertips, Davey Winder explores where else encryption might go in the future.
Laying the Smackdown - When Hacking Back is Legitimate
If you’re prepared to attack back, you need to be able to hit the other side harder than they hit you, and you always have to be ready to be hit with the best you have got. Transfer this away from Chicago crime bosses and the law and into the world of cybersecurity, and you have a case of attackers and defenders. Yet there are rare examples of those being attacked actually taking the fight back to the attacker.
The UK Cybersecurity Strategy: How it Measures Up
The new UK cybersecurity strategy has, generally, been welcomed since it was announced in November 2016. However, will it really be able to measure the countless different factors that make up cyber-threats?
Trump's White House: What Now for Cybersecurity?
Cybersecurity came to the fore in this presidential race like never before, but many question Donald Trump’s tech credentials going forward. Phil Muncaster investigates…
The Risk Avengers
What do you get when you combine three talented and experienced cybersecurity professionals? Eleanor Dallaway met The Risk Avengers and found out
Medical Devices Need a Strong Dose of Cybersecurity
Technical innovations in the industry – the increasing adoption of electronic health records combined with an ever-increasing network of medical devices, healthcare apps and wearables –open up even more avenues for cyber-criminals to gain unauthorized access to sensitive data.
How to Get on the Right Side of the EU Data Regulations
Richard Whomes outlines how organizations handling cross-border data can make sure they stay on top of the EU General Data Protection Regulation and US-based Privacy Shield