Infosecurity News Features

Password Managers - Resolution to Authentication Headaches

Password Managers - Resolution to Authentication Headaches

“Password managers are a good thing” as they give “huge advantages in a world where there's far too many passwords for anyone to remember”

Identifying the Problem of Disruption

Identifying the Problem of Disruption

Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?

All At Sea

All At Sea

Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.

#WIREDSecurity: The Best Bits

#WIREDSecurity: The Best Bits

WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

Almost a Third of Staff Still Fall for Phishing Emails

Almost a Third of Staff Still Fall for Phishing Emails

Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

We’re Vulnerable to Attack, Say 89% of UK Organizations

We’re Vulnerable to Attack, Say 89% of UK Organizations

Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

Harsh Lessons Learned by Linkedin

Harsh Lessons Learned by Linkedin

A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.

What’s Hot on Infosecurity Magazine?