Infosecurity Magazine Features

In-Flight Cyber-Attacks

In-Flight Cyber-Attacks

Find out how realistic the threat to planes in the air is and what security measures airlines should be putting in place to secure live aircraft

Carrot or Stick: is NIS2 the Way Forward?

Carrot or Stick: is NIS2 the Way Forward?

Alex Meehan asks whether the EU's updated NIS Directive is sufficient for the modern threat environment

Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?

Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?

Two experts assess what companies need to change in their security approach in light of the Ukraine war

Cybersecurity’s Age Old Question

Cybersecurity’s Age Old Question

James Coker explores an under-discussed area of diversity in context of information security – age

Hacking the CFAA

Hacking the CFAA

Will the DoJ's decision to no longer prosecute "good faith" hackers protect security researchers?

Cybersecurity's New Quantum Shift: When Cryptographers Team Up Against Tomorrow's Qubits

Cybersecurity's New Quantum Shift: When Cryptographers Team Up Against Tomorrow's Qubits

Infosecurity Magazine investigates the recent world-first commercial trial of a quantum secured metro network and what this means for cybersecurity

Is Cyber Insurance Exacerbating the Ransomware Crisis?

Is Cyber Insurance Exacerbating the Ransomware Crisis?

Ed Ventham argues insurers are helping protect organizations while Alan Jenkins believes the industry is currently worsening the ransomware crisis

Situation Critical: Assessing the US’ New Incident Reporting Legislation

Situation Critical: Assessing the US’ New Incident Reporting Legislation

Danny Bradbury questions whether the Cyber Incident Reporting for Critical Infrastructure Act has the substance needed to succeed

The Future of Cybersecurity Certifications Crossroad

The Future of Cybersecurity Certifications Crossroad

Security practitioners are increasingly conflicted about the role that certifications play in their career development. Phil Muncaster finds out why

The SOC of the Future

The SOC of the Future

Benjamin David investigates the different ways security experts can future-proof their security operation center

Top 10: Deepfakes

Top 10: Deepfakes

Infosecurity has compiled a list of the top 10 most recent high-profile examples of deepfakes to date, listed in date order.

Russia-Ukraine War: The Cyber Dimension

Russia-Ukraine War: The Cyber Dimension

James Coker investigates the cyber-dimension in the Russia-Ukraine war and the implications for the global cyber landscape

What’s Hot on Infosecurity Magazine?