Infosecurity News Features

Security Headlines Present Little Christmas Cheer
A look back at the headlines over the Christmas period, in the best and worst instances of information security.

GDPR Passes the Security Test
The EU Parliament and Council have agreed on a text for the long-awaited General Data Protection Regulation, and it has been greeted with positive appraisal from security experts.

Six Months Later, Find Out If The OPM Breach Affected You
News appeared last week that more than a million American victims of the Office of Personnel Management (OPM) hack had not been notified that they were involved.

Keeping Software Defined Datacenters Secure
Anyone who has been paying attention to current thought around datacenter design will be aware of the increasing trend towards a software defined datacenter (SDDC). But in the same way that cloud was, initially at least, seen as insecure, does running an SDDC mean that an organization is more at risk?

Predictions for 2016
2015 - what a year it was. But what will the coming twelve months likely bring for the security industry?

UK General Election 2015: What the Major Parties Promise on Security
With just a week to go until polling day, Infosecurity takes a look at what the major contenders in the UK’s general election pledge on cybersecurity and technology

Webinar Report: Anti-Encryption Comments from Authorities Branded Unrealistic by Security Experts
Business implications of banning encryption make the idea absurd, panelists argue

Ten Years of White Hat Ball: The Difference a Decade Makes
As the White Hat Ball prepares to celebrate its tenth anniversary, Eleanor Dallaway takes a look back at the highlights and successes from the past ten years, and learns what a difference a decade can make

2015 Industry Predictions Part 3: Defense, Response, Collaboration
In the final part of Infosecurity's 2015 forecast, industry officials prophesy developments in the field of threat response and detection

2015 Industry Predictions Part 2: The Escalating Threats
Infosecurity's predictions series continues as industry insiders deliver their thoughts on the developing threat landscape

2015 Industry Predictions Part 1: The Recurring Themes
The infosec industry looks ahead to 2015, beginning with the continued persistence of known threats

Information Security Industry Shellshocked: Why Did Bash Catch Us by Surprise?
Last week the information security world was rocked yet again by a major vulnerability in a little known piece of software that could have severe ramifications on the security of large swathes of the internet.

BlackHat 2014: Businesses Look to NIST Risk Management Framework in Bid to Improve Security Posture
The recently released Risk Management Framework from the National Institute for Standards and Technology outlines what organizations need to do to improve their information security posture against serious attacks.

BlackHat 2014: Incident Response Best Practice & Automation Key to Success - Bruce Schneier
Network breaches are inevitable. It’s what happens next that really matters, said renowned cryptographic expert Bruce Schneier during the Black Hat security conference.

The Perfect Target
As the extraordinary Target breach narrative continues to unravel, Drew Amorosi investigates exactly who and what is to blame

Tales of the Cyber Underground: A Hacker's Life Inside
In the latest Tales of the Cyber Underground instalment, Tom Brewster ponders the effect that jail time has on convicted hackers, and talks to cybercriminals who have served prison sentences about their experiences.

The Hype and the Hurt: Bitcoin’s Incredible Boom
The ups and downs of the cryptocurrency market have made headlines – and not all of them good ones. Tom Brewster takes a look at both sides of the digital coin

Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?
Law enforcement agencies across the world are obsessed with virtual currencies, be it Bitcoin, Litecoin or Dogecoin. This was made apparent on a recent trip to Europol’s European Cyber Crime Centre (EC3) in The Hague.

Tales of the Cyber Underground: The Case of the Stoned Cat (When Android Malware Gone Wrong)
In the latest instalment of the 'Tales of the Cyber Underground' series, Tom Brewster looks into a piece of Android malware selling for thousands on the forums, but appears to have succumbed to an early demise...

Hacker Training 101
How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…









