Infosecurity News Features

Does Fake News Affect Threat Intelligence?
Is fake news more about dirty tricks, or a new form of subversion?

Mobile Payments Face the PCI Treatment
Mobile-enabled payments are thriving, so the PCI SSC are launching standards on their deployment

#SID2018: Is the Internet Safer?
This year’s Safer Internet Day adopts the slogan “Create, Connect and Share Respect: A better internet starts with you” with a strong emphasis on using the internet and what makes users feel good or bad

When, Not If: Does NCSC Pessimism Hurt UK Cybersecurity?
Does this level of ‘defeatism’ add anything to the confidence of national security?

Fine Time: What GDPR Enforcement Could Look Like
Research looks at the size of a regulatory fine under the GDPR

Cybersecurity Predictions for 2018 - Part Two
An evaluation of the final five points from the top 11 most common trends seen in 2018 predictions

Cybersecurity Predictions for 2018 - Part One
With an inbox bursting with predictions for 2018, Infosecurity triaged all of the comments into 11 common themes

Views on GDPR From Within Europe
A review of the views of GDPR from ISSE 2017

UK’s Best Cyber-Enthusiasts Compete in Cyber Security Challenge Masterclass
Competitors took part in ultra-realistic cyber defense simulation at London’s Trinity House

The Corruption of the Past Created Future Compliance
Tom Fox on how the corruption of the past has helped create future compliance frameworks

Cyber Start-Up Company of the Year Talks Phishing Defense
Inky produces phishing technologies that are built on machine learning technologies, and recently won a VC-voted award

The Rabid Ransomware Bunnies Behind #BadRabbit
The main Bad Rabbit entry point was a rogue Flash update and once infected, it was able to pass through networks via open protocols.

Cyber Challenge Foundation Launched at Stephanie Daman Memorial
The Cyber Security Challenge has launched a charity in the memory of former CEO Stephanie Daman, who passed away in June of this year

The Battle for Cybersecurity Talent in America: East Coast vs. West Coast
Infosecurity Magazine explores the theory that all good cybersecurity talent migrates to the West Coast of America...

Two Weeks Before WannaCry: Surviving a Zero-Day Ransomware Attack
There are many factors that can be gained from this experience, not least realizing how capable the attackers were

Skills Shortage Includes a Lack of Teachers
Lochgelly High School sent out a letter to parents stating they will be unable to teach computing to pupils after the only ‘capable’ teacher left for another school

Cybersecurity Behind the Scenes at Wimbledon
Eleanor Dallaway investigates how IBM secures Wimbledon, one of the world's most popular sporting events

Flash Enters Final Three Years as Adobe Pulls Support Plug
Adobe announced this week that it plans to bring down the curtain on the Flash Player in three years.

Alpha Bay Takedown Shows Government Collaboration Capability
Described as “roughly ten times the size” of the Silk Road, the dark web market Alpha Bay has been taken down in a joint effort between international law enforcement, US government departments and Europol.

Are Cybersecurity Companies Compatible with the Cloud?
Dan Raywood talks to CloudShare’s VP R&D, Muly Gottlieb, about the battle between cloud and security







