Infosecurity News Features

  1. Does Fake News Affect Threat Intelligence?

    Is fake news more about dirty tricks, or a new form of subversion?

  2. Mobile Payments Face the PCI Treatment

    Mobile-enabled payments are thriving, so the PCI SSC are launching standards on their deployment

  3. #SID2018: Is the Internet Safer?

    This year’s Safer Internet Day adopts the slogan “Create, Connect and Share Respect: A better internet starts with you” with a strong emphasis on using the internet and what makes users feel good or bad

  4. When, Not If: Does NCSC Pessimism Hurt UK Cybersecurity?

    Does this level of ‘defeatism’ add anything to the confidence of national security?

  5. Fine Time: What GDPR Enforcement Could Look Like

    Research looks at the size of a regulatory fine under the GDPR

  6. Cybersecurity Predictions for 2018 - Part Two

    An evaluation of the final five points from the top 11 most common trends seen in 2018 predictions

  7. Cybersecurity Predictions for 2018 - Part One

    With an inbox bursting with predictions for 2018, Infosecurity triaged all of the comments into 11 common themes

  8. Views on GDPR From Within Europe

    A review of the views of GDPR from ISSE 2017

  9. UK’s Best Cyber-Enthusiasts Compete in Cyber Security Challenge Masterclass

    Competitors took part in ultra-realistic cyber defense simulation at London’s Trinity House

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. The Corruption of the Past Created Future Compliance

    Tom Fox on how the corruption of the past has helped create future compliance frameworks

  11. Cyber Start-Up Company of the Year Talks Phishing Defense

    Inky produces phishing technologies that are built on machine learning technologies, and recently won a VC-voted award

  12. The Rabid Ransomware Bunnies Behind #BadRabbit

    The main Bad Rabbit entry point was a rogue Flash update and once infected, it was able to pass through networks via open protocols.

  13. Cyber Challenge Foundation Launched at Stephanie Daman Memorial

    The Cyber Security Challenge has launched a charity in the memory of former CEO Stephanie Daman, who passed away in June of this year

  14. The Battle for Cybersecurity Talent in America: East Coast vs. West Coast

    Infosecurity Magazine explores the theory that all good cybersecurity talent migrates to the West Coast of America...

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  15. Two Weeks Before WannaCry: Surviving a Zero-Day Ransomware Attack

    There are many factors that can be gained from this experience, not least realizing how capable the attackers were

  16. Skills Shortage Includes a Lack of Teachers

    Lochgelly High School sent out a letter to parents stating they will be unable to teach computing to pupils after the only ‘capable’ teacher left for another school

  17. Cybersecurity Behind the Scenes at Wimbledon

    Eleanor Dallaway investigates how IBM secures Wimbledon, one of the world's most popular sporting events

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  18. Flash Enters Final Three Years as Adobe Pulls Support Plug

    Adobe announced this week that it plans to bring down the curtain on the Flash Player in three years.

  19. Alpha Bay Takedown Shows Government Collaboration Capability

    Described as “roughly ten times the size” of the Silk Road, the dark web market Alpha Bay has been taken down in a joint effort between international law enforcement, US government departments and Europol.

  20. Are Cybersecurity Companies Compatible with the Cloud?

    Dan Raywood talks to CloudShare’s VP R&D, Muly Gottlieb, about the battle between cloud and security

What’s Hot on Infosecurity Magazine?