Infosecurity Magazine Features

Top 10: Ransomware Payments

Top 10: Ransomware Payments

What are the top 10 confirmed or widely reported ransomware payments to date?

Defining Cyber-Resiliency in the Modern World

Defining Cyber-Resiliency in the Modern World

What does it mean for organizations to be cyber-resilient in the post-COVID new dawn?

Critical National Infrastructure: The Growing Threat

Critical National Infrastructure: The Growing Threat

CNI systems continually prove to be particularly open to attack from a variety of threat actors. Kate O’Flaherty investigates

Securing the Return to the Office Post-COVID

Securing the Return to the Office Post-COVID

James Coker looks at the potential security risks posed by staff returning to the office environment

Top 5 Security Considerations for Hybrid Working

Top 5 Security Considerations for Hybrid Working

Top 5 security considerations for a securing a safe hybrid workforce

Top 10 Cybersecurity Salaries

Top 10 Cybersecurity Salaries

What are the highest paying roles in cybersecurity?

The Rise of DDoS: Flooded Networks, Downtime and How to Bolster Protection

The Rise of DDoS: Flooded Networks, Downtime and How to Bolster Protection

Danny Bradbury explores the current DDoS threat backdrop and outlines where and how attackers are evolving their techniques

Top 5 Zero Trust Policies

Top 5 Zero Trust Policies

Five crucial role and access strategies to adopt a zero trust framework for your organization

Ask the Experts: How to Create a Culture of Diversity and Inclusion

Ask the Experts: How to Create a Culture of Diversity and Inclusion

Industry experts Harman Singh, Samantha Humphries and Jennifer DeTrani discuss workplace diversity and inclusion

Profile Interview: Robert Hannigan

Profile Interview: Robert Hannigan

Former Director of GCHQ, Robert Hannigan, talks to James Coker about his days advising the Prime Minister and his passion for increasing diversity in the industry

Google's FLoC: Privacy Gone Amok?

Google's FLoC: Privacy Gone Amok?

Google’s cookie replacement, FLoC, is coming under heavy criticism from privacy experts

How Quantum Computing Could Reshape Security

How Quantum Computing Could Reshape Security

A quantum future is closer than we think, but what are the implications for national and corporate security?

What’s Hot on Infosecurity Magazine?