Infosecurity Magazine Features

  1. Rehabilitating Black Hats

    If you color outside the lines today, will you toe the line tomorrow? Danny Bradbury explores whether those on the cyber ‘dark side’ can turn to the light.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  2. NotPetya Ransomware: Lessons Learned

    Roi Perez explores what the NotPetya ransomware taught an industry still reeling from the WannaCry outbreak

    1. Roi Perez

      Freelance Writer

  3. Smartphones Spur Biometric ATM Authentication

    With the rise of ‘mobile-first’ consumers, Robin Arnfield investigates how smartphones may be the future for biometric authentication at ATMs

    1. Robin Arnfield

      Banking/Payments Industry Writer

  4. The Security Design Flaws of Biometrics

    In my opinion, biometrics don’t follow best practice security principles and therefore fall short in many applications – particularly information security.

    1. Photo of Terry Gold

      Terry Gold

      Principal Analyst of D6 Research

  5. The Benefits of Biometrics

    When looking at the results of biometric authentication deployments, it’s understandable why it is increasing in popularity.

    1. Photo of Brett Beranek

      Brett Beranek

      VP & General Manager, Security and Biometrics, Nuance

  6. The Impact of a Breach: When the Fallout Means More than Money

    Data breaches can mean more than just financial loss. Wendy M. Grossman explores how fear, anxiety and even danger can impact victims

    1. Wendy M. Grossman

      Contributing Writer

  7. In Search of an Ethical Code for Cybersecurity

    Ethics plays a big part in many lines of work, but what about information security?

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  8. Ask the Experts: What Did the Cybersecurity Industry Learn from WannaCry?

    Three security experts share their thoughts on what the WannaCry ransomware attack taught us about the industry

    1. Photo of Robert Holmes

      Robert Holmes

      VP of Products, Proofpoint

    2. Photo of Brian Honan

      Brian Honan

      CEO, BH Consulting

    3. Photo of Raj Samani

      Raj Samani

      Chief Scientist and McAfee Fellow, McAfee

  9. Democracy Hacked: Why the Black Hats Are Turning Their Attention to Elections

    With senior officials in the US, France, UK and Germany all blaming Russia for targeted attempts to influence their elections, Phil Muncaster takes a look at a turbulent year for democracy and asks ‘what next’?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  10. The Stress Test of the Red Team

    Red Teams have become increasingly prevalent in cybersecurity over the past few years, as defensive tactics increase against a very capable adversary.

  11. Rise of the Machines: Cognitive Computers in Cybersecurity

    Machine learning has come a long way since early research into the concept in the 1950s, but what role is it now playing in the information security landscape, and at what cost?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. WannaCry: The Industry's Wake-up Call

    Friday May 12 may yet be seen as a turning point for global IT security.

    1. Photo of Stephen Pritchard

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

  13. Top Ten Lessons Learned from WannaCry

    The WannaCry ransomware variant changed the view of ransomware globally, mainly due to its ability to capture multiple major businesses and critical infrastructure.

  14. Interview: Neira Jones

    Interview with Neira Jones, independent advisor and international speaker with various board positions.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  15. Minimizing the Loss of DDoS

    As DDoS attacks grow in prevalence and size, Dan Raywood explores whether protection is keeping pace with a threat that has already trapped some of the biggest targets across the globe

  16. Securing the Smaller Business

    It is natural to think that it is more difficult for smaller firms to implement security as the perception is that it’s a specialist area.

    1. Photo of Johan  Pieterse

      Johan Pieterse

      Head of IT and Security, Racing Post

  17. Protecting the Large Enterprise

    The challenge of maintaining effective oversight of our security posture is exciting and challenging in equal measure.

    1. Photo of Paul Watts

      Paul Watts

      Distinguished Analyst, ISF

  18. Keep Calm and Comply: One Year and Counting Until GDPR

    With the May 2018 deadline fast approaching for Europe’s new data protection laws, Phil Muncaster outlines practical tips from the experts on how to get in shape ahead of the big date

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  19. Does the UK Need an Information Security Royal Charter?

    The new paradigm of the digital economy requires the information security profession to be clearly identified as a key broker for all information and data assets.

    1. Photo of Amanda Finch

      Amanda Finch

      General Manager. IISP

    2. Photo of Ian Glover

      Ian Glover

      President, CREST

    3. Photo of Robin Smith

      Robin Smith

      IT Security Manager, West Yorkshire Police

  20. Blockchain: What it Means for Cybersecurity

    Are Blockchains redefining cybersecurity or do they pose more security challenges than they solve? Sooraj Shah investigates

    1. Sooraj Shah

      Freelance Writer

What’s hot on Infosecurity Magazine?