Infosecurity Magazine Features

Q&A: Rik Ferguson

Q&A: Rik Ferguson

Trend Micro's Rik Ferguson talks about his career and life in cybersecurity.

People in Security: The Weakest Link vs Innocent and On Your Team

People in Security: The Weakest Link vs Innocent and On Your Team

Are people really the weakest link in the security chain?

Drive-By Download & Fileless Malware Attacks: Minimum Action, Maximum Impact

Drive-By Download & Fileless Malware Attacks: Minimum Action, Maximum Impact

As the prevalence of drive-by download and fileless malware attacks continues to grow, Davey Winder explores their impact and outlines strategies for defense

Arming Law Enforcement with Industry Skills and Volunteers

Arming Law Enforcement with Industry Skills and Volunteers

Skills shortage in law enforcement has led to more use of volunteers from inside and outside cybersecurity. What do they look for and who are the volunteers?

Profile Interview: Dug Song

Profile Interview: Dug Song

Eleanor Dallaway meets Duo Security co-founder Dug Song to hear the story of his journey from liquor store worker to security pioneer. Written by Michael Hill

Q&A: Theresa Payton

Q&A: Theresa Payton

Talking with Theresa Payton about her career in cybersecurity

Top Ten Tips for Enabling BYOD

Top Ten Tips for Enabling BYOD

Infosecurity brings you 10 top tips for getting BYOD to work for your organization with the least risk to your business

Cool for School: Closing the Skills Gap Through the Education System

Cool for School: Closing the Skills Gap Through the Education System

With the cybersecurity workforce gap now estimated to be leaving the industry short of three million employees, Michael Hill investigates why the sector must invest in the education system to help solve its own problem

Securing a Flexible Workforce: A Challenge of the Modern Workplace

Securing a Flexible Workforce: A Challenge of the Modern Workplace

Mobile and remote working is not without its share of security challenges.

The Marriott Starwood Breach: An Analysis

The Marriott Starwood Breach: An Analysis

Kathryn Pick looks back at the attack on the Marriott International hotel chain, one of the biggest data breaches to hit headlines in 2018.

Cybersecurity Under Trump: Two Years On

Cybersecurity Under Trump: Two Years On

Two years into an unsettled presidency, Danny Bradbury explores why US cybersecurity still lacks leadership

Cyber Insurance: The Next Step in Cybersecurity Preparedness?

Cyber Insurance: The Next Step in Cybersecurity Preparedness?

What benefits can cyber insurance bring to businesses, and are there any downsides for those looking to invest in the new protection?

What’s Hot on Infosecurity Magazine?