Infosecurity Magazine Features

  1. Dissecting the UK’s New IoT Security Bill

    The UK’s new PSTI Bill aims to strengthen the security of IoT devices, but James Coker questions whether it goes far enough?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. How not to Pay a Ransomware Demand

    Amid surging ransomware attacks, Alex Meehan asks how organizations should act when faced with the nightmare scenario of a ransom demand

    1. Photo of Alex Meehan

      Alex Meehan

      Technology and Features Journalist

  3. Securing Smart Cities From Ransomware Crooks

    Danny Bradbury investigates how cities can protect themselves against ransomware as they prepare for the smart city revolution

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  4. Cybersecurity's Image Problem

    Benjamin David investigates whether prevailing cyber imagery and rhetoric are dangerous for the cybersecurity industry and explores how we can fix them

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  5. Diversifying Cyber: A Focus on Neurodiversity and Physical Disability

    James Coker takes a deep dive into the NCSC’s recent Decrypting Diversity report, analyzing its findings in respect of neurodivergent and disabled people working in cyber

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. The Security Challenge of the Century: Security in the Metaverse

    Kate O'Flaherty considers the security challenges in the metaverse and investigates how they can be resolved

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  7. Stamping Out CSAM With Machine Learning?

    If the question is how to control harmful content, Davey Winder considers whether the answer is machine learning?

    1. Davey Winder

  8. Top 10: Cryptocurrency Heists

    What are the largest recorded cryptocurrency thefts to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Cryptojacking: What’s New in the World of Resource Hijacking?

    Phil Muncaster discovers that a combination of surging crypto prices and the pandemic have given cyber-criminals a shot in the arm

  10. Ask the Experts: How to Ensure Your Cybersecurity Keeps Pace With Advances in Tech

    Three security experts discuss how businesses can prepare themselves for major changes in the tech landscape

    1. Photo of Brennan Baybeck

      Brennan Baybeck

      ISACA Board Director; VP & CISO for Customer Services, Oracle

    2. Photo of Paul  Holland

      Paul Holland

      Principle Research Analyst, Information Security Forum

    3. Photo of Paul McKay

      Paul McKay

      Senior Analyst, Forrester

  11. The Impact of Emerging Technology on the Future of Cybersecurity

    Benjamin David examines the potential future impact - both good and bad - of emerging technologies

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  12. Defense in Depth? An Up-Close Look at the CMMC

    Danny Bradbury looks at the impact of CMMC so far and questions whether it needs to adapt

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

What’s hot on Infosecurity Magazine?