Infosecurity Magazine Features
The Risk Avengers
What do you get when you combine three talented and experienced cybersecurity professionals? Eleanor Dallaway met The Risk Avengers and found out
Medical Devices Need a Strong Dose of Cybersecurity
Technical innovations in the industry – the increasing adoption of electronic health records combined with an ever-increasing network of medical devices, healthcare apps and wearables –open up even more avenues for cyber-criminals to gain unauthorized access to sensitive data.
How to Get on the Right Side of the EU Data Regulations
Richard Whomes outlines how organizations handling cross-border data can make sure they stay on top of the EU General Data Protection Regulation and US-based Privacy Shield
Redefining Security in the Internet of Services
Devices ranging from smartphones to home automation systems, smart lights fitness wearables and embedded vehicle sensors have created an incredible platform that we know as the Internet of Things (IoT), but this vast constellation of connected devices is only the first step in a longer journey. The next step involves creating services that run on top of it. This new layer – which we can call the Internet of Services (IoS) – brings its own security challenges.
Should C-Level Bonuses Be Linked to Cybersecurity Success?
MPs suggested bonuses should be slashed for CEOs whose firms were hit by cyber-attacks. Sooraj Shah asks whether that’s fair
Making Bugs Bountiful
With black hat brokers able to outbid even the likes of Google and Apple for vulnerabilities, Davey Winder explores the possibility that the bug bounty model is fundamentally flawed
Skills Gap: How to Attract the Best Staff
As the cybersecurity skills gap continues to plague the industry, it has never been more important for organizations to have a sound understanding of how to attract and retain the best staff. Michael Hill reports
Ransomware Economics: Why the Threat is Here to Stay
The concept of extorting a victim for money is nothing new; in fact it’s older than the internet by many centuries. Over the years, however, malware has evolved from spying on users and harvesting information, to promoting malicious links for clickbait, to the current straight forward tactic of ‘give us your money’.
Interview: Jennifer Steffens, CEO of IOActive
Jennifer Steffens, CEO of IOActive, loves sailing. She also loves live music and snowshoeing, but above all, she loves her job. In a suite overlooking Las Vegas Boulevard, Eleanor Dallaway spends an afternoon with the matriarch of the research firm
Securing the Smart City
As urban populations grow, public authorities are looking for new ways to deal with congestion, pollution and crime. Applying Internet of Things (IoT) technologies, sensors, and low-power, wide area (LPWA) networks gives administrators a much more detailed and up-to-date picture of what is happening in the city.
Insuring Safety in Cyber
The last time that Infosecurity looked at the cyber-insurance market, the hype machine was in overdrive about taking it out, what it covers and how much coverage you could get. However, the big question remains on whether or not it’s really worthwhile having insurance to protect you from an unknown threat.
Awareness Training: Time for an Overhaul?
Back in June, a couple of hundred people packed into a conference hall at Infosecurity Europe 2016. The title of the session was ‘Securing the Connected Human’ and it was described in the show guide as being about security awareness training. Those who attended in the hope of getting some tips on how to do it, or some reassurance that what they’re currently doing is right, probably walked away mightily disappointed.