Infosecurity Magazine Features

5 Best Practices for Mitigating DDoS Attacks

5 Best Practices for Mitigating DDoS Attacks

To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices

Ask The Experts: How To Respond to a Data Breach Effectively

Ask The Experts: How To Respond to a Data Breach Effectively

Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively

Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations

Why the Future of Cybersecurity is AI

Why the Future of Cybersecurity is AI

As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence

Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR

Top 5 Best Practices for Cloud Security

Top 5 Best Practices for Cloud Security

Learn how to keep data safer in the cloud with these five best security practices

Biden and Cybersecurity: A Six-Month Performance Review

Biden and Cybersecurity: A Six-Month Performance Review

Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace

Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself

Do We Need to Have a Security Conversation About GPT-3?

Do We Need to Have a Security Conversation About GPT-3?

Davey Winder explores the security and privacy issues surrounding an area of AI that is setting a marker in the tech world

State of the Global Threat Landscape

State of the Global Threat Landscape

Benjamin David analyzes 2021’s top cyber trends and attacks across the globe

Time to Reduce Reliance on CDN Providers?

Time to Reduce Reliance on CDN Providers?

James Coker looks at the issues surrounding the recent widespread website outages caused by an issue at CDN provider Fastly

R-E-S-P-E-C-T in S-E-C-U-R-I-T-Y

R-E-S-P-E-C-T in S-E-C-U-R-I-T-Y

Harassment has devastatingly become more endemic in the infosecurity industry, but Respect in Security aims to fetter that. Eleanor Dallaway meets with its founders to learn more

What’s Hot on Infosecurity Magazine?