Infosecurity Magazine Features

Top Ten Tips for Enhancing Your Career

Top Ten Tips for Enhancing Your Career

Is there enough opportunity for people considering a career change to get into cybersecurity from other sectors?

Q&A: Bobbie Stempfley

Q&A: Bobbie Stempfley

Bobbie Stempfley talks about her likes and loves in her cybersecurity career

Staff Phishing Testing: Raising Awareness vs a Failing Concept

Staff Phishing Testing: Raising Awareness vs a Failing Concept

Two experts discuss the pros and cons of phishing simulation testing

Mergers and Acquisitions: Potential Poisoned Chalices

Mergers and Acquisitions: Potential Poisoned Chalices

Why the merger and acquisition process can be rife with security risks and challenges

Q&A: Thom Langford

Q&A: Thom Langford

Thom Langford sheds light on his path into the cybersecurity industry, security misconceptions and his favorite books

Credential Stuffing: Cracking Open Accounts with Stolen Data

Credential Stuffing: Cracking Open Accounts with Stolen Data

As breached data continues to flood the dark web, what can organizations can do to mitigate the impact of automated attacks

Profile Interview: Ken Munro

Profile Interview: Ken Munro

From till tampering to re-defining security standards in IoT and smart devices, Ken Munro tells Michael Hill how he came to lead a team of expert UK pen testers

Neurodiversity in the Cybersecurity Industry

Neurodiversity in the Cybersecurity Industry

Kathryn Pick examines the role neurodiverse individuals can play in closing the cyber skills gap

Europe’s New Copyright Laws: Sending Shock Waves Across the Globe

Europe’s New Copyright Laws: Sending Shock Waves Across the Globe

Experts claim new directive is damaging for small websites and individual rights holders

Q&A: Rik Ferguson

Q&A: Rik Ferguson

Trend Micro's Rik Ferguson talks about his career and life in cybersecurity.

People in Security: The Weakest Link vs Innocent and On Your Team

People in Security: The Weakest Link vs Innocent and On Your Team

Are people really the weakest link in the security chain?

Drive-By Download & Fileless Malware Attacks: Minimum Action, Maximum Impact

Drive-By Download & Fileless Malware Attacks: Minimum Action, Maximum Impact

As the prevalence of drive-by download and fileless malware attacks continues to grow, Davey Winder explores their impact and outlines strategies for defense

What’s Hot on Infosecurity Magazine?