Infosecurity Magazine Features

Top 10: Cyber-Secure Countries
What are the most cyber-secure countries to date?

Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t
Ira Winkler believes you should attribute appropriate blame and penalties to users in cases of clear negligence while Wendy Nather argues this approach is counterproductive

Ask The Experts: How to Stay on Top of Cyber-Hygiene
Three security experts advise how to develop a continuous cyber-hygiene plan for your organization

Cyber Start-ups: How to Get Off the Ground and into the Stratosphere
Phil Muncaster investigates how to make it big in a sector already worth billions

Dissecting the UK’s New IoT Security Bill
The UK’s new PSTI Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?

How not to Pay a Ransomware Demand
Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand

Securing Smart Cities From Ransomware Crooks
Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution

Cybersecurity's Image Problem
Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how we can fix them

Diversifying Cyber: A Focus on Neurodiversity and Physical Disability
James Coker takes a deep dive into the NCSC’s recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber

The Security Challenge of the Century: Security in the Metaverse
Kate O'Flaherty considers the security challenges in the metaverse and investigates how they can be resolved

Stamping Out CSAM With Machine Learning?
If the question is how to control harmful content, Davey Winder considers whether the answer is machine learning?

Top 10: Cryptocurrency Heists
What are the largest recorded cryptocurrency thefts to date?

Cryptojacking: What’s New in the World of Resource Hijacking?
Phil Muncaster discovers that a combination of surging crypto prices and the pandemic have given cyber-criminals a shot in the arm

Ask the Experts: How to Ensure Your Cybersecurity Keeps Pace With Advances in Tech
Three security experts discuss how businesses can prepare themselves for major changes in the tech landscape

The Impact of Emerging Technology on the Future of Cybersecurity
Benjamin David examines the potential future impact - both good and bad - of emerging technologies

Defense in Depth? An Up-Close Look at the CMMC
Danny Bradbury looks at the impact of CMMC so far and questions whether it needs to adapt

Sharing is Caring: Using Intelligence to Fight Cybercrime
James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice

AI: End of the SOC as We Know It vs. A SOC That's Staying Put
Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant

Tales From the Meeting Room: Cyber’s Sexism Challenge
James Coker explores the scale of sexist behaviors in meetings in the cyber industry

Infosec Rock Stars: The Sham, The Myth, The Legends
Eleanor Dallaway unpacks the infosec industry's obsession with fame




















