Infosecurity Magazine Features

Profile Interview: Tom Kellerman
Eleanor Dallaway had the pleasure of meeting Tom Kellerman, a man whose psyche is utterly immersed in security, both physical and cyber

The Stress of Security Leadership
Kathryn Pick explores the growing impact of stress, burnout and anxiety on security leaders across the industry

How Confusion Reigned for Thomas Cook Users
Following the liquidation of Thomas Cook in September, fraudsters were quick to take advantage through social engineering scams, with legitimate banks adding uncertainty to the issue soon after

Q&A: Bruce Hallas
Q&A with human factor and awareness specialist Bruce Hallas

What’s the Deal With DNS?
An often overlooked but foundational layer of the internet may hold the answer to improved threat defense. Phil Muncaster finds out more

PSD2: Why Security Practices Now Matter to Payment Standards
The PSD2 has been delayed, but is the world ready for the payment standard?

Responsible Disclosure: Navigating the Vulnerability Landscape
The ins and outs of vulnerability disclosure, and shining a light on the intricate process of flaw finding

Top Ten Tips for Efficient and Secure Backups
How can you backup effectively and do so to a state whereby you can recover, and then begin working again?

Profile Interview: Troy Hunt
Michael Hill meets HaveIBeenPwned? founder Troy Hunt to hear the story of his journey from sports-loving youngster to tech luminary

The Evolution of Fraud
With business email compromise, click farms, synthetic identities, and omnichannel attacks, the pickings for fraudsters have never been richer

The Huawei Story: An Analysis
Reflecting on the ongoing dispute between the US and the Chinese telecoms company Huawei, and what the future might have in store

Not All Fun & Games: Cybercrime & the Gaming Industry
Michael Hill investigates how and why the video gaming industry has become an attractive target for cybercrime

Top Ten Tips for Enhancing Your Career
Is there enough opportunity for people considering a career change to get into cybersecurity from other sectors?

Q&A: Bobbie Stempfley
Bobbie Stempfley talks about her likes and loves in her cybersecurity career

Staff Phishing Testing: Raising Awareness vs a Failing Concept
Two experts discuss the pros and cons of phishing simulation testing

Mergers and Acquisitions: Potential Poisoned Chalices
Why the merger and acquisition process can be rife with security risks and challenges

Q&A: Thom Langford
Thom Langford sheds light on his path into the cybersecurity industry, security misconceptions and his favorite books

Credential Stuffing: Cracking Open Accounts with Stolen Data
As breached data continues to flood the dark web, what can organizations can do to mitigate the impact of automated attacks

Profile Interview: Ken Munro
From till tampering to re-defining security standards in IoT and smart devices, Ken Munro tells Michael Hill how he came to lead a team of expert UK pen testers

Neurodiversity in the Cybersecurity Industry
Kathryn Pick examines the role neurodiverse individuals can play in closing the cyber skills gap












