Infosecurity Magazine Features

  1. Do We Need to Have a Security Conversation About GPT-3?

    Davey Winder explores the security and privacy issues surrounding an area of AI that is setting a marker in the tech world

    1. Davey Winder

  2. State of the Global Threat Landscape

    Benjamin David analyzes 2021’s top cyber trends and attacks across the globe

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  3. Time to Reduce Reliance on CDN Providers?

    James Coker looks at the issues surrounding the recent widespread website outages caused by an issue at CDN provider Fastly

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. R-E-S-P-E-C-T in S-E-C-U-R-I-T-Y

    Harassment has devastatingly become more endemic in the infosecurity industry, but Respect in Security aims to fetter that. Eleanor Dallaway meets with its founders to learn more

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  5. Top 10: Ransomware Payments

    What are the top 10 confirmed or widely reported ransomware payments to date?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. Defining Cyber-Resiliency in the Modern World

    What does it mean for organizations to be cyber-resilient in the post-COVID new dawn?

  7. Critical National Infrastructure: The Growing Threat

    CNI systems continually prove to be particularly open to attack from a variety of threat actors. Kate O’Flaherty investigates

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  8. Securing the Return to the Office Post-COVID

    James Coker looks at the potential security risks posed by staff returning to the office environment

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Top 5 Security Considerations for Hybrid Working

    Top 5 security considerations for a securing a safe hybrid workforce

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  10. Top 10 Cybersecurity Salaries

    What are the highest paying roles in cybersecurity?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. The Rise of DDoS: Flooded Networks, Downtime and How to Bolster Protection

    Danny Bradbury explores the current DDoS threat backdrop and outlines where and how attackers are evolving their techniques

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  12. Top 5 Zero Trust Policies

    Five crucial role and access strategies to adopt a zero trust framework for your organization

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?