Infosecurity Magazine Features

US Federal Privacy Legislation: Challenges on the Hill
Danny Bradbury investigates the spider-web of state and agency laws that attempt to tackle data privacy in the US

Top 10: Fines Issued for Data Protection Violations
What are the 10 biggest fines issued by regulators for data protection violations?

Ask The Experts: How to Reassure Your Customers About Your Security and Privacy Frameworks
Three security experts advise how to smoothly embark your customers on a secure path

Securing a Galaxy Far, Far Away: Cybersecurity’s Final Frontier
James Coker examines what it will take to secure the space arena now and into the future

Business Email Compromise Is Dead, Long Live Cyber-Enabled Financial Fraud
With a surge in global financial losses due to BEC, this social engineering attack can no longer be exclusively treated as a simple financial incident. Kevin Poireault investigates why security teams need to battle financial fraud

Joining the Dots: How to Optimize Cyber Threat Intelligence for the Win
Phil Muncaster investigates what can be done to consolidate and deliver the information network defenders need

Shifting Mindset: Tackling Mental Health Head On
Beth Maundrill investigates the problems and how mental health is intrinsically linked to the cybersecurity skills shortage

Point/Counterpoint: Are We Moving to a Passwordless Future?
Two cybersecurity experts debate whether we are moving towards a passwordless future

In-Flight Cyber-Attacks
Find out how realistic the threat to planes in the air is and what security measures airlines should be putting in place to secure live aircraft

Carrot or Stick: is NIS2 the Way Forward?
Alex Meehan asks whether the EU's updated NIS Directive is sufficient for the modern threat environment

Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?
Two experts assess what companies need to change in their security approach in light of the Ukraine war

Cybersecurity’s Age Old Question
James Coker explores an under-discussed area of diversity in context of information security – age