Infosecurity Magazine Features

Profile Interview: Troy Hunt

Profile Interview: Troy Hunt

Michael Hill meets HaveIBeenPwned? founder Troy Hunt to hear the story of his journey from sports-loving youngster to tech luminary

The Evolution of Fraud

The Evolution of Fraud

With business email compromise, click farms, synthetic identities, and omnichannel attacks, the pickings for fraudsters have never been richer

The Huawei Story: An Analysis

The Huawei Story: An Analysis

Reflecting on the ongoing dispute between the US and the Chinese telecoms company Huawei, and what the future might have in store

Not All Fun & Games: Cybercrime & the Gaming Industry

Not All Fun & Games: Cybercrime & the Gaming Industry

Michael Hill investigates how and why the video gaming industry has become an attractive target for cybercrime

Top Ten Tips for Enhancing Your Career

Top Ten Tips for Enhancing Your Career

Is there enough opportunity for people considering a career change to get into cybersecurity from other sectors?

Q&A: Bobbie Stempfley

Q&A: Bobbie Stempfley

Bobbie Stempfley talks about her likes and loves in her cybersecurity career

Staff Phishing Testing: Raising Awareness vs a Failing Concept

Staff Phishing Testing: Raising Awareness vs a Failing Concept

Two experts discuss the pros and cons of phishing simulation testing

Mergers and Acquisitions: Potential Poisoned Chalices

Mergers and Acquisitions: Potential Poisoned Chalices

Why the merger and acquisition process can be rife with security risks and challenges

Q&A: Thom Langford

Q&A: Thom Langford

Thom Langford sheds light on his path into the cybersecurity industry, security misconceptions and his favorite books

Credential Stuffing: Cracking Open Accounts with Stolen Data

Credential Stuffing: Cracking Open Accounts with Stolen Data

As breached data continues to flood the dark web, what can organizations can do to mitigate the impact of automated attacks

Profile Interview: Ken Munro

Profile Interview: Ken Munro

From till tampering to re-defining security standards in IoT and smart devices, Ken Munro tells Michael Hill how he came to lead a team of expert UK pen testers

Neurodiversity in the Cybersecurity Industry

Neurodiversity in the Cybersecurity Industry

Kathryn Pick examines the role neurodiverse individuals can play in closing the cyber skills gap

What’s Hot on Infosecurity Magazine?