Infosecurity Magazine Features

Sharing is Caring: Using Intelligence to Fight Cybercrime

Sharing is Caring: Using Intelligence to Fight Cybercrime

James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice

AI: End of the SOC as We Know It vs. A SOC That's Staying Put

AI: End of the SOC as We Know It vs. A SOC That's Staying Put

Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant

Tales From the Meeting Room: Cyber’s Sexism Challenge

Tales From the Meeting Room: Cyber’s Sexism Challenge

James Coker explores the scale of sexist behaviors in meetings in the cyber industry

Infosec Rock Stars: The Sham, The Myth, The Legends

Infosec Rock Stars: The Sham, The Myth, The Legends

Eleanor Dallaway unpacks the infosec industry's obsession with fame

5 Best Practices for Mitigating DDoS Attacks

5 Best Practices for Mitigating DDoS Attacks

To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices

Ask The Experts: How To Respond to a Data Breach Effectively

Ask The Experts: How To Respond to a Data Breach Effectively

Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively

Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations

Why the Future of Cybersecurity is AI

Why the Future of Cybersecurity is AI

As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence

Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR

Top 5 Best Practices for Cloud Security

Top 5 Best Practices for Cloud Security

Learn how to keep data safer in the cloud with these five best security practices

Biden and Cybersecurity: A Six-Month Performance Review

Biden and Cybersecurity: A Six-Month Performance Review

Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace

Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself

What’s Hot on Infosecurity Magazine?