Infosecurity News Features

February's M&A News Roundup

February's M&A News Roundup

Buyers and sellers from the cybersecurity industry were once again reluctant to share financial terms regarding February’s deals

Threat intelligence: Why Attributing Cyber-Attacks Matters

Threat intelligence: Why Attributing Cyber-Attacks Matters

While cyber attribution has become much more challenging with the emergence of cybercrime-as-a-service, threat intelligence analysts argue it is still valuable to anticipate future attacks

Cyber Sanctions: An Effective Weapon or Just Posturing?

Cyber Sanctions: An Effective Weapon or Just Posturing?

Cyber sanctions are increasingly used by governments in response to cybercrime, but are they having the desired effect?

Russia-Ukraine: New Norms in Cyber Warfare Emerging

Russia-Ukraine: New Norms in Cyber Warfare Emerging

Defence and cybersecurity analysts consider the cybersecurity implications the conflict and why cyber-Armageddon has not yet been realized

The US Government’s Open Source Security Policy Discussed

The US Government’s Open Source Security Policy Discussed

Camille Stewart Gloster and Anjana Rajan from the ONCD discuss how the federal government plans to help enhance security in open source software

Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits

Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits

Or Yair, a SafeBreach security researcher, developed a proof of concept to create a next-gen wiper using EDR tools to wipe files

January's M&A News Roundup

January's M&A News Roundup

Cybersecurity buyers and sellers remained cagey regarding January’s deals

#DataPrivacyWeek: Addressing ChatGPT's Shortfalls in Data Protection Law Compliance

#DataPrivacyWeek: Addressing ChatGPT's Shortfalls in Data Protection Law Compliance

OpenAI needs to better address whether its language model ChatGPT is compliant with data protection regulations across the world, experts say

#DataPrivacyWeek: ChatGPT's Data-Scraping Model Under Scrutiny From Privacy Experts

#DataPrivacyWeek: ChatGPT's Data-Scraping Model Under Scrutiny From Privacy Experts

OpenAI’s latest large language model raises significant privacy issues that need to be addressed, experts say

#DataPrivacyWeek: How to Respond to Changing Consumer Data Privacy Expectations

#DataPrivacyWeek: How to Respond to Changing Consumer Data Privacy Expectations

Infosecurity speaks to leading experts about how organizations should adapt their privacy strategies to changing consumer expectations

MFA Bypass: The Next Frontline for Security Pros

MFA Bypass: The Next Frontline for Security Pros

MFA has long been recommended by governments and industry bodies, but cyber-criminals are searching for ways to turn this security strength into a weakness

The LastPass Breaches: Password Managers in the Spotlight

The LastPass Breaches: Password Managers in the Spotlight

What do the recent LastPass breaches mean for the use of password managers in the future

What’s Hot on Infosecurity Magazine?