Infosecurity Magazine Features

US Federal Privacy Legislation: Challenges on the Hill

US Federal Privacy Legislation: Challenges on the Hill

Danny Bradbury investigates the spider-web of state and agency laws that attempt to tackle data privacy in the US

Top 10: Fines Issued for Data Protection Violations

Top 10: Fines Issued for Data Protection Violations

What are the 10 biggest fines issued by regulators for data protection violations?

Ask The Experts: How to Reassure Your Customers About Your Security and Privacy Frameworks

Ask The Experts: How to Reassure Your Customers About Your Security and Privacy Frameworks

Three security experts advise how to smoothly embark your customers on a secure path

Securing a Galaxy Far, Far Away: Cybersecurity’s Final Frontier

Securing a Galaxy Far, Far Away: Cybersecurity’s Final Frontier

James Coker examines what it will take to secure the space arena now and into the future

Business Email Compromise Is Dead, Long Live Cyber-Enabled Financial Fraud

Business Email Compromise Is Dead, Long Live Cyber-Enabled Financial Fraud

With a surge in global financial losses due to BEC, this social engineering attack can no longer be exclusively treated as a simple financial incident. Kevin Poireault investigates why security teams need to battle financial fraud

Joining the Dots: How to Optimize Cyber Threat Intelligence for the Win

Joining the Dots: How to Optimize Cyber Threat Intelligence for the Win

Phil Muncaster investigates what can be done to consolidate and deliver the information network defenders need

Shifting Mindset: Tackling Mental Health Head On

Shifting Mindset: Tackling Mental Health Head On

Beth Maundrill investigates the problems and how mental health is intrinsically linked to the cybersecurity skills shortage

Point/Counterpoint: Are We Moving to a Passwordless Future?

Point/Counterpoint: Are We Moving to a Passwordless Future?

Two cybersecurity experts debate whether we are moving towards a passwordless future

In-Flight Cyber-Attacks

In-Flight Cyber-Attacks

Find out how realistic the threat to planes in the air is and what security measures airlines should be putting in place to secure live aircraft

Carrot or Stick: is NIS2 the Way Forward?

Carrot or Stick: is NIS2 the Way Forward?

Alex Meehan asks whether the EU's updated NIS Directive is sufficient for the modern threat environment

Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?

Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?

Two experts assess what companies need to change in their security approach in light of the Ukraine war

Cybersecurity’s Age Old Question

Cybersecurity’s Age Old Question

James Coker explores an under-discussed area of diversity in context of information security – age

What’s Hot on Infosecurity Magazine?