Infosecurity Magazine Features

  1. Hacking the CFAA

    Will the DoJ's decision to no longer prosecute "good faith" hackers protect security researchers?

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  2. Cybersecurity's New Quantum Shift: When Cryptographers Team Up Against Tomorrow's Qubits

    Infosecurity Magazine investigates the recent world-first commercial trial of a quantum secured metro network and what this means for cybersecurity

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  3. Is Cyber Insurance Exacerbating the Ransomware Crisis?

    Ed Ventham argues insurers are helping protect organizations while Alan Jenkins believes the industry is currently worsening the ransomware crisis

    1. Photo of Alan Jenkins

      Alan Jenkins

      Principal Consultant, thecybrsecnav, CISO-in-Residence, CyLon Labs & ClubCISO Member, CyLon

    2. Photo of Ed Ventham

      Ed Ventham

      co-founder, Assured

  4. Situation Critical: Assessing the US’ New Incident Reporting Legislation

    Danny Bradbury questions whether the Cyber Incident Reporting for Critical Infrastructure Act has the substance needed to succeed

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  5. The Future of Cybersecurity Certifications Crossroad

    Security practitioners are increasingly conflicted about the role that certifications play in their career development. Phil Muncaster finds out why

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  6. The SOC of the Future

    Benjamin David investigates the different ways security experts can future-proof their security operation center

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  7. Top 10: Deepfakes

    Infosecurity has compiled a list of the top 10 most recent high-profile examples of deepfakes to date, listed in date order.

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Russia-Ukraine War: The Cyber Dimension

    James Coker investigates the cyber-dimension in the Russia-Ukraine war and the implications for the global cyber landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Top 10: Cyber-Secure Countries

    What are the most cyber-secure countries to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. Blaming Users for Security Fails: Oh, Yes We Should vs. Oh, No We Shouldn’t

    Ira Winkler believes you should attribute appropriate blame and penalties to users in cases of clear negligence while Wendy Nather argues this approach is counterproductive

    1. Photo of Wendy Nather

      Wendy Nather

      Head of Advisory CISOs, Cisco

    2. Photo of Ira Winkler

      Ira Winkler

      chief security architect, Walmart

  11. Ask The Experts: How to Stay on Top of Cyber-Hygiene

    Three security experts advise how to develop a continuous cyber-hygiene plan for your organization

    1. Photo of Brad LaPorte

      Brad LaPorte

      Advisor - Lionfish Tech Advisors

    2. Photo of Colin Tankard

      Colin Tankard

      Managing Director, Digital Pathways

    3. Photo of Holly Grace Williams

      Holly Grace Williams

      Managing Director, AkimboCore

  12. Cyber Start-ups: How to Get Off the Ground and into the Stratosphere

    Phil Muncaster investigates how to make it big in a sector already worth billions

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?