Infosecurity Magazine Features

  1. The Top Ten DDoS Attacks of all Time

    The DDoS attack has moved from a sign of cyber-protest to something tactically used to bring websites, applications and even DNS providers offline.

  2. Interview: Charlie Miller

    Interview with Charlie Miller, lead of Autonomous Transportation Security at Didi Chuxing.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  3. The CISO of the Future: Getting Down to Business

    As the role that cybersecurity plays in the business environment grows, Michael Hill investigates how the job of the CISO will change from one which once solely oversaw technical solutions to one that will be ever-more business-orientated

  4. Trump’s First Cybersecurity Scorecard

    ‘C for effort – could try harder’ seems to be the overall judgment of Trump’s first quarter as President, reports Danny Bradbury

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  5. Artificial Intelligence: The Obstacles Standing in its Way

    AI is coming and I’d love to tell you it is almost here, yet the reality is there are some sizeable obstacles that stand in the way.

    1. Photo of Davi Ottenheimer

      Davi Ottenheimer

      President of flyingpenguin

  6. The Future of Security: AI and Cognitive

    Companies must filter massive amounts of data found in network and system logs, directories, database access records and other machine information.

    1. Photo of John Bruce

      John Bruce

      CEO and co-founder of Resilient Systems

  7. Using Deception to Hunt Cyber Attackers

    Deception enables the organization to thwart attacks even if it is lacking experienced hunters

    1. Photo of Doron Kolton

      Doron Kolton

      Founder and CEO of TopSpin

  8. How to Effectively Spend Information Security Budget

    Three experts share their thoughts on the best way to spend budget on information security.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  9. Interview: Chris Wysopal, CTO of Veracode

    Chris Wysopal from Veracode describes his job as “building services that enable developers to write secure code.”

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  10. Could High Speed Training Offer an Express Route to Solving the Skills Gap?

    Following the launch of the Cyber Retraining Academy, Stephen Jones, UK MD at SANS Institute, argues that if we are to provide an immediate resolution to the urgent cybersecurity skills gap, recruiters must prioritize psychometric testing and high-speed training over degrees and ‘career experience’

    1. Photo of Stephen  Jones

      Stephen Jones

      UK MD at SANS Institute

  11. The Top Ten Data Breaches of All Time

    While the data collection and retention concept has taken off as the online world has evolved, the cost has been major losses and breaches of that data suffered by those entrusted to securely store it.

  12. Interview: Dr Jessica Barker

    There aren’t many things as intricate and complex as information security, but human behavior is probably one of them. At least, that’s the message Michael Hill got after spending an afternoon with independent cybersecurity consultant Dr Jessica Barker.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Interview: Javvad Malik

    Javvad Malik, perhaps equally known as @J4VV4D or one of the three Host Unknown musketeers, wanted to be an actor when he grew up. More specifically, a wise-cracking side-kick, or a menacing villain. Instead, he’s a security advocate at AlienVault, where his job is to make information security as accessible and understandable to as broad an audience as possible. Whilst there may not be a red carpet, he finds it “immensely rewarding to see how we help secure organizations”.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  14. Killing Me Softly with His Hack

    Cybersecurity attacks can, and have, killed companies – but now analysts think larger firms will fall.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  15. The Future of Encryption

    As technology advances so does our ability to encrypt data, with neural networks now capable of learning how to keep data safe. With so much innovation at our fingertips, Davey Winder explores where else encryption might go in the future.

    1. Davey Winder

  16. Laying the Smackdown - When Hacking Back is Legitimate

    If you’re prepared to attack back, you need to be able to hit the other side harder than they hit you, and you always have to be ready to be hit with the best you have got. Transfer this away from Chicago crime bosses and the law and into the world of cybersecurity, and you have a case of attackers and defenders. Yet there are rare examples of those being attacked actually taking the fight back to the attacker.

  17. The UK Cybersecurity Strategy: How it Measures Up

    The new UK cybersecurity strategy has, generally, been welcomed since it was announced in November 2016. However, will it really be able to measure the countless different factors that make up cyber-threats?

    1. Wendy M. Grossman

      Contributing Writer

  18. Trump's White House: What Now for Cybersecurity?

    Cybersecurity came to the fore in this presidential race like never before, but many question Donald Trump’s tech credentials going forward. Phil Muncaster investigates…

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  19. The Risk Avengers

    What do you get when you combine three talented and experienced cybersecurity professionals? Eleanor Dallaway met The Risk Avengers and found out​

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  20. Medical Devices Need a Strong Dose of Cybersecurity

    Technical innovations in the industry – the increasing adoption of electronic health records combined with an ever-increasing network of medical devices, healthcare apps and wearables –open up even more avenues for cyber-criminals to gain unauthorized access to sensitive data.

    1. Photo of DJ Singh

      DJ Singh

      Digital Architect at Wipro Digital

What’s hot on Infosecurity Magazine?