Infosecurity Magazine Features

  1. Profile Interview: Mikko Hyppönen

    Michael Hill sits down with F-Secure’s chief research officer to find out a little more about the man who has served the same company for almost 30 years

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Cryptojacking - The Parasitical Crime

    Cryptojacking doesn’t destroy data. Instead, it chews up computing resources. Have criminals have finally found a largely victimless crime?

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  3. A Tough Month for Facebook

    As the Cambridge Analytica scandal unfolds, Danny Bradbury takes a closer look at Facebook’s track record as it pertains to data and privacy

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  4. Ask the Experts: How to Win Cybersecurity Buy-in From the Board

    Infosecurity Magazine asked three experts to tell us how they win cybersecurity buy-in from the boardroom

    1. Photo of Andrew Barratt

      Andrew Barratt

      Vice President, Technology & Enterprise, Managing Director, International, Coalfire

    2. Photo of Chris Diogenous

      Chris Diogenous

      Chief Commercial Officer, London Digital Security Centre

    3. Photo of Ray mond

      Ray mond

      Founder & Penetration Tester, CyDefe Labs

  5. Password Managers: Business Gains vs Potential Pains

    Is a password manager a solution to authentication problems, or another burden on security?

    1. Photo of Matthew Cunliffe

      Matthew Cunliffe

      Technical Consultant, Europoint Communications

    2. Photo of Brian Honan

      Brian Honan

      CEO, BH Consulting

  6. Information Security Challenges in the Cloud

    An update on the highs, lows and the cloudy areas of security challenges in a fast-evolving cloud environment.

  7. The Dark Side of the GDPR

    While bringing a new dawn of data protection to Europe, the GDPR could also bring a negative side with fraudsters, activists and phishers all ready to pounce on the regulation’s capabilities.

  8. Millennials in the Cybersecurity Workforce

    It’s been estimated that just 12% of the cybersecurity workforce is under 35, with gaps between what hiring managers prioritize and what they feel millennials offer as employees

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. How Veterans Are Defending Our Networks

    Thanks to the cybersecurity skills gap, Danny Bradbury finds military veterans are serving in a different kind of role

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  10. Top Ten Ways to Detect Phishing

    Infosecurity spoke to three anti-phishing vendors to get the best advice on how to avoid becoming a victim.

  11. Diversity in Cybersecurity: A Problem without a Quick Fix

    Kathryn Pick explores why diversity in cybersecurity is a far wider topic than gender inequality.

    1. Kathryn Pick

      Technology Writer

  12. Spectre: An Analysis

    The truth behind Spectre, the fundamental issues it brings to light and its potential impact going forward

    1. Davey Winder

  13. IoT Regulation: One Rule to Bind Them All vs Mission Impossible

    Two experts explore whether the IoT could (and should) be regulated

    1. Photo of Mike Gillespie

      Mike Gillespie

      Managing Director & Co-Founder, Advent IM Ltd

    2. Photo of Ken Munro

      Ken Munro

      Senior Partner, Pen Test Partners

    3. Photo of Ken Munro

      Ken Munro

      Partner, Pen Test Partners

  14. Are Humans the Weakest Link in the Security Chain?

    For too long, the human has been considered the weakest security link. Wendy M. Grossman asks whether it’s time for a change in thinking

    1. Wendy M. Grossman

      Contributing Writer

  15. Cyber Essentials: Fad or Future

    Back in 2014, the state of cybersecurity had got so troublesome that the UK government developed a standard to prove a level of cyber-hygiene. Infosecurity takes a look at the progress that Cyber Essentials has made, and analyzes its success.

  16. Ask the Experts: How Do You Find Cybersecurity Talent?

    Three security experts share their thoughts on finding, cultivating and keeping skilled talent amid a cyber-skills gap

    1. Photo of Andy Cripps

      Andy Cripps

      Operations Director, Quicksilva

    2. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  17. Top Ten: Cybersecurity M&A Deals

    The M&A factor has seen established companies become part of another, brands disappear, technologies launched and most importantly – new companies and sectors created

  18. Security & the Social Network: the Good, the Bad & the Overshared

    "We all live in a digital age and benefit from social media but we don't have to put everything about ourselves out there! "

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. When IoT Attacks: The End of the World as We Know It?

    As IoT devices find their way into everything from aircraft to power plants and even home appliances, Phil Muncaster asks where our obsession with tech disruption will lead us.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  20. Interview: Graham Cluley

    Not every infosec expert would liken computer programming to writing a story, but Graham Cluley does. Michael Hill spends an afternoon with the man whose love of a tale preceded his love of tech

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?