Infosecurity Magazine Features

  1. Sharing is Caring: Using Intelligence to Fight Cybercrime

    James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. AI: End of the SOC as We Know It vs. A SOC That's Staying Put

    Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant

    1. Photo of Milad Aslaner

      Milad Aslaner

      Senior Director, SentinelOne

    2. Photo of Carsten Maple

      Carsten Maple

      Professor of Cyber Systems Engineering, University of Warwick's Cyber Security Centre

  3. Tales From the Meeting Room: Cyber’s Sexism Challenge

    James Coker explores the scale of sexist behaviors in meetings in the cyber industry

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. Infosec Rock Stars: The Sham, The Myth, The Legends

    Eleanor Dallaway unpacks the infosec industry's obsession with fame

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  5. 5 Best Practices for Mitigating DDoS Attacks

    To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  6. Ask The Experts: How To Respond to a Data Breach Effectively

    Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

    2. Photo of Heath Renfrow

      Heath Renfrow

      CISO, Conversant Group

    3. Photo of Amar Singh

      Amar Singh

      CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

  7. Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive

    Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations

    1. Photo of Jordon Kelly

      Jordon Kelly

      Research Analyst, Information Security Forum

    2. Photo of Callum Roxan

      Callum Roxan

      global head of threat intelligence, F-Secure

  8. Why the Future of Cybersecurity is AI

    As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  9. Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR

    Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  10. Top 5 Best Practices for Cloud Security

    Learn how to keep data safer in the cloud with these five best security practices

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  11. Biden and Cybersecurity: A Six-Month Performance Review

    Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  12. Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity

    With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?