Infosecurity Magazine Features

  1. How to Get on the Right Side of the EU Data Regulations

    Richard Whomes outlines how organizations handling cross-border data can make sure they stay on top of the EU General Data Protection Regulation and US-based Privacy Shield

    1. Photo of Richard  Whomes

      Richard Whomes

      Senior Director, Rocket Software

  2. Redefining Security in the Internet of Services

    Devices ranging from smartphones to home automation systems, smart lights fitness wearables and embedded vehicle sensors have created an incredible platform that we know as the Internet of Things (IoT), but this vast constellation of connected devices is only the first step in a longer journey. The next step involves creating services that run on top of it. This new layer – which we can call the Internet of Services (IoS) – brings its own security challenges.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  3. Should C-Level Bonuses Be Linked to Cybersecurity Success?

    MPs suggested bonuses should be slashed for CEOs whose firms were hit by cyber-attacks. Sooraj Shah asks whether that’s fair

  4. Making Bugs Bountiful

    With black hat brokers able to outbid even the likes of Google and Apple for vulnerabilities, Davey Winder explores the possibility that the bug bounty model is fundamentally flawed

    1. Davey Winder

  5. Skills Gap: How to Attract the Best Staff

    As the cybersecurity skills gap continues to plague the industry, it has never been more important for organizations to have a sound understanding of how to attract and retain the best staff. Michael Hill reports

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. Ransomware Economics: Why the Threat is Here to Stay

    The concept of extorting a victim for money is nothing new; in fact it’s older than the internet by many centuries. Over the years, however, malware has evolved from spying on users and harvesting information, to promoting malicious links for clickbait, to the current straight forward tactic of ‘give us your money’.

  7. Interview: Jennifer Steffens, CEO of IOActive

    Jennifer Steffens, CEO of IOActive, loves sailing. She also loves live music and snowshoeing, but above all, she loves her job. In a suite overlooking Las Vegas Boulevard, Eleanor Dallaway spends an afternoon with the matriarch of the research firm

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  8. Securing the Smart City

    As urban populations grow, public authorities are looking for new ways to deal with congestion, pollution and crime. Applying Internet of Things (IoT) technologies, sensors, and low-power, wide area (LPWA) networks gives administrators a much more detailed and up-to-date picture of what is happening in the city.

    1. Photo of Stephen Pritchard

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

  9. Insuring Safety in Cyber

    The last time that Infosecurity looked at the cyber-insurance market, the hype machine was in overdrive about taking it out, what it covers and how much coverage you could get. However, the big question remains on whether or not it’s really worthwhile having insurance to protect you from an unknown threat.

  10. Awareness Training: Time for an Overhaul?

    Back in June, a couple of hundred people packed into a conference hall at Infosecurity Europe 2016. The title of the session was ‘Securing the Connected Human’ and it was described in the show guide as being about security awareness training. Those who attended in the hope of getting some tips on how to do it, or some reassurance that what they’re currently doing is right, probably walked away mightily disappointed.

  11. Outlandish Car Hacking Claims?

    Many electric and connected cars have proved to be hackable, and visitors to this year’s Infosecurity Europe got to see another example – the Mitsubishi Outlander; a plug in hybrid electric vehicle with a mobile app, usually used for locating the car, flashing the headlights and locking it remotely, which is enabled by a Wi-Fi access point on the vehicle.

  12. Malware Swiftly Goes Upscale

    Like anyone perfecting their craft, cyber-criminals are honing their skills and aiming upward, using malware to steal money not only from retail payments systems but from the global commercial payments systems used to transfer billions among banks every day.

    1. Photo of Karen Epper Hoffman

      Karen Epper Hoffman

      Freelance Journalist, Infosecurity Magazine

  13. The Future of Regulation in the Digital World

    Technology adoption and digital innovation has revolutionized the current commercial environment – from driverless cars and drones delivering goods to digital payments, innovation is pushing ahead at a significantly faster pace than regulation.

    1. Photo of Derek Cummins

      Derek Cummins

      director at Protiviti

  14. ATMs Still a Weak Link for Bank Security

    More than physical distraction and rogue software applications on the ATM itself, the securing of the hole in the wall has become a priority in banking security. Robin Arnfield looks at threats and developments

  15. Divided We Stand: Will Brexit Weaken the UK’s Cybersecurity Industry?

    After the historic EU referendum result in June, Phil Muncaster takes a look at what the next steps are

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  16. Seconomics

    Money continues to be spent on security solutions and services, but is there a return on investment? Wendy M. Grossman looks at the case for security economics and whether spending to defend really adds up

    1. Wendy M. Grossman

      Contributing Writer

  17. The Best View

    If analysis technology is the next trend, how is it being deployed? Dan Raywood talks to Gigamon’s Marshall Wolfe about his deployment and what he feels he gets from it

  18. Wolf in Sheep’s Clothing: Combating the Insider Threat

    What can you do to defend against the unknown quantity that is the insider threat? Adam F. Godfrey, CISSP looks at some solutions and if your ally is actually your enemy in disguise

    1. Photo of Adam Godfrey

      Adam Godfrey

      Cybersecurity Policy and Compliance Consultant

  19. Connected Vehicles: the Next Big Security Challenge?

    With the concept of the connected car invading our lives at what often seems like unprecedented speed, ensuring they are made secure at the manufacturing stage is emerging as one of the next big cybersecurity skills challenges. Michael Hill reports

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. Hackers Have Evolved into Sophisticated, Organized Criminals

    If there’s one thing the last few years have shown us it’s that hackers have evolved into sophisticated, organized criminals, capable of orchestrating well-oiled, imaginative attacks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?