Infosecurity Magazine Features

Cyber Insurance: The Next Step in Cybersecurity Preparedness?

Cyber Insurance: The Next Step in Cybersecurity Preparedness?

What benefits can cyber insurance bring to businesses, and are there any downsides for those looking to invest in the new protection?

Q&A: Chet Wisniewski

Q&A: Chet Wisniewski

Chet Wisniewski talks about his career to date working in the information security industry.

The Printer Security Problem

The Printer Security Problem

Michael Hill investigates a significant element of corporate endpoint security that is still slipping under the radar

Putting Faith in Zero Trust

Putting Faith in Zero Trust

The last couple of years have seen the zero trust concept gain fresh traction. What has driven this new interest, and is this the way that security networks should be built now?

Cool Heads and Clear Minds: Getting Your Incident Response Plan Together

Cool Heads and Clear Minds: Getting Your Incident Response Plan Together

In 2018, serious cyber-attacks are inevitable. As a result, effective incident response is crucial to cybersecurity readiness.

Top Ten Cases of Insider Threat

Top Ten Cases of Insider Threat

The top 10 notorious examples of when the insider threat hit big.

GDPR: Six Months On

GDPR: Six Months On

Cordery's Jonathan Armstrong looks back at the first six months living under the GDPR, and what we've learned so far.

The Dark Side of Automation

The Dark Side of Automation

With autonomous technology evolving quickly, Rene Millman explores whether machine learning has a dark side and asks what can happen when bots go bad

Magecart Attacks: The Card Skimming Epidemic

Magecart Attacks: The Card Skimming Epidemic

Looking at the common tactics contributing to recent Magecart attack success and explores how to defend against them.

You’ve Got M@il: The Rise of Business Email Compromise

You’ve Got M@il: The Rise of Business Email Compromise

Danny Bradbury assesses how BEC attacks have become a top social engineering threat to organizations of all sizes

Advancements in Authentication: Improving Security vs Creating New Problems

Advancements in Authentication: Improving Security vs Creating New Problems

Two experts discuss whether advancements in authentication have led to better security, or created new problems

NHS at 70: Growing Old & Growing Threats

NHS at 70: Growing Old & Growing Threats

As the NHS turns 70, Kathryn Pick assesses the UK healthcare provider’s evolution of information security

What’s Hot on Infosecurity Magazine?